Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carryable and automatically balanced intravenous drip frame and using method thereof., , , and . WOCC, page 1-2. IEEE, (2018)Design of Carryable Intravenous Drip Frame with Automatic Balancing., , , , , and . Sensors, 20 (3): 793 (2020)Fast online classification of network traffic using new feature-embedded hierarchical structure., , , , , and . Comput. Networks, (December 2023)Arc-transitive Cayley graphs on nonabelian simple groups with prime valency., , , and . J. Comb. Theory, Ser. A, (2021)Semi-supervised ranking SVM-assisted IGA with hierarchical evaluations., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Grounding Privacy-by-Design for Information Systems., and . PACIS, page 107. (2013)Tradeoff Between Lifetime and Rate Allocation in Wireless Sensor Networks: A Cross Layer Approach., , , and . INFOCOM, page 267-275. IEEE, (2007)Multi-domain feature analysis for depression: A study of N170 in time, frequency and spatial domains simultaneously., , , , , and . EMBC, page 5986-5989. IEEE, (2013)Survey on Run-to-Run Control Algorithms in High-Mix Semiconductor Manufacturing Processes., , , and . IEEE Trans. Ind. Informatics, 11 (6): 1435-1444 (2015)Provable Security Analysis of FIDO2., , , and . IACR Cryptol. ePrint Arch., (2020)