2024
Variable Admittance Control Using Velocity-Curvature Patterns to Enhance Physical Human-Robot Interaction.
IEEE Robotics Autom. Lett., June, 2024
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center.
IEEE Internet Things J., April, 2024
PGAHum: Prior-Guided Geometry and Appearance Learning for High-Fidelity Animatable Human Reconstruction.
CoRR, 2024
Fry Counting Method in High-Density Culture Based on Image Enhancement Algorithm and Attention Mechanism.
IEEE Access, 2024
2023
An Indoor Fingerprint Positioning Algorithm Based on WKNN and Improved XGBoost.
Sensors, 2023
Shrimpseed_Net: Counting of Shrimp Seed Using Deep Learning on Smartphones for Aquaculture.
IEEE Access, 2023
2022
Super-resolution guided knowledge distillation for low-resolution image classification.
Pattern Recognit. Lett., 2022
2019
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
2018
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems.
Proceedings of the Third International Conference on Security of Smart Cities, 2018
2016
Compressive sampling-based CFO-estimation with exploited features.
EURASIP J. Wirel. Commun. Netw., 2016
Aggregation based Cell Selection Methods for multi-RAT HetNet.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016
Delay analysis of completely irrepressible sequences for mobile ad hoc networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016
A new protocol sequences based broadcast scheme for wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016
2014
A robust video watermarking algorithm based on singular value decomposition and slope-based embedding technique.
Multim. Tools Appl., 2014
2011
A Controllable Error-Drift Elimination Scheme for Watermarking Algorithm in H.264/AVC Stream.
IEEE Signal Process. Lett., 2011
Revisit of the Markov Model of IEEE 802.11 DCF for an Error-Prone Channel.
IEEE Commun. Lett., 2011
2006
Performance analysis of delayed acknowledgment scheme in UWB-based high-rate WPAN.
IEEE Trans. Veh. Technol., 2006
2005
Impact of topology on Bluetooth Scatternet.
Int. J. Pervasive Comput. Commun., 2005
Controlling Network Topology in Forming Bluetooth Scatternet.
IEICE Trans. Commun., 2005
Improved Performance with Adaptive Dly-ACK for IEEE 802.15.3 WPAN over UWB PHY.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Access control for future mobile devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
2004
Performance model of IEEE 802.11 DCF with variable packet length.
IEEE Commun. Lett., 2004
Cross-layer Optimized Routing for Bluetooth Personal Area Network.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
Adaptive Dly-ACK for TCP over 802.15.3 WPAN.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Impact of Topology on Multi-hop Bluetooth Personal Area Network.
Proceedings of the Embedded and Ubiquitous Computing, 2004
2001
Joint error detection and VF arithmetic coding.
Proceedings of the IEEE International Conference on Communications, 2001
2000
Evaluations of Burst Error Recovery for VF Arithmetic Coding.
Proceedings of the 15th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2000), 2000