Login / Signup

Secured measurement fusion scheme against deceptive ECM attack in radar network.

Chaoqun YangHeng ZhangFengzhong QuZhiguo Shi
Published in: Secur. Commun. Networks (2016)
Keyphrases
  • fusion scheme
  • comparative analysis
  • personal identification
  • denoising
  • fusion method