Author of the publication

Research on Embedded-Based Wireless Authentication System.

, , , and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 469-475. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic reasoning in dynamic multiagent systems., , and . NMR, page 16-24. (2004)An active contour model for image segmentation based on elastic interaction., , and . J. Comput. Phys., 219 (1): 455-476 (2006)Mobile Phone Sensing Systems: A Survey., , , and . IEEE Commun. Surv. Tutorials, 15 (1): 402-427 (2013)A Cross-Layer Optimization Mechanism for Inter-session Network Coding in Wireless Mesh Network., , and . HPCC/EUC, page 264-271. IEEE, (2013)Incorporating pre-training in long short-term memory networks for tweet classification., , and . Soc. Netw. Anal. Min., 8 (1): 52:1-52:16 (2018)Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis., , , , and . IEEE Trans. Cybern., 50 (7): 3081-3093 (2020)MA-CRNN: a multi-scale attention CRNN for Chinese text line recognition in natural scenes., , , , , and . Int. J. Document Anal. Recognit., 23 (2): 103-114 (2020)Mining massive SNP data for identifying associated SNPs and uncovering gene relationships., , , , , , , , , and . BCB, page 304-313. ACM, (2014)A Parallel-Data-Free Speech Enhancement Method Using Multi-Objective Learning Cycle-Consistent Generative Adversarial Network., and . IEEE ACM Trans. Audio Speech Lang. Process., (2020)The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms., , , , and . IEEE Trans. Inf. Forensics Secur., 12 (11): 2558-2573 (2017)