Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weaknesses Analysis and Countermeasure of a Verifier-Based Key Agreement Protocol., , and . HPCC, page 1015-1018. IEEE Computer Society, (2008)Deep-Learning-Based Automatic Selection of Fewest Channels for Brain-Machine Interfaces., , and . IEEE Trans. Cybern., 52 (9): 8668-8680 (2022)Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System., , and . ICDCS Workshops, page 217-223. IEEE Computer Society, (2005)Formal Verification of Cryptographic Protocol for Secure RFID System., , , , and . NCM (2), page 470-477. IEEE Computer Society, (2008)978-0-7695-3322-3.Heart and Lung Sound Measurement Using an Esophageal Stethoscope with Adaptive Noise Cancellation., , , , , and . Sensors, 21 (20): 6757 (2021)A Smartphone-Based Automatic Diagnosis System for Facial Nerve Palsy., , , and . Sensors, 15 (10): 26756-26768 (2015)The 0-3 Lead Zirconate-Titanate (PZT)/Polyvinyl-Butyral (PVB) Composite for Tactile Sensing., , , , , , and . Sensors, 23 (3): 1649 (February 2023)An online top-down SSVEP-BMI for augmented reality., , , , , and . BCI, page 1-3. IEEE, (2019)The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing., and . DEXA Workshops, page 693-697. IEEE Computer Society, (2007)Development of a Bispectral index score prediction model based on an interpretable deep learning algorithm., , , , , , and . Artif. Intell. Medicine, (September 2023)