Author of the publication

An Adaptive Tuning Sparse Fast Fourier Transform.

, , , , and . PCM (2), volume 10736 of Lecture Notes in Computer Science, page 991-999. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views., , , and . Comput. Secur., (2020)Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum., , , and . CoRR, (2021)How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach., , , , and . ICC, page 4199-4204. IEEE, (2022)Performance Modeling of Linux Network System with Open vSwitch., , , and . Peer-to-Peer Netw. Appl., 13 (1): 151-162 (2020)Revisiting FAW attack in an imperfect PoW blockchain system., , , , and . Peer-to-Peer Netw. Appl., 15 (5): 2430-2443 (2022)Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks., , , , and . IEEE Trans. Netw. Serv. Manag., 18 (3): 3079-3091 (2021)A new two-dimensional Fourier transform algorithm based on image sparsity., , and . ICASSP, page 1373-1377. IEEE, (2017)Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies., , , , and . Comput. J., 63 (10): 1564-1583 (2020)Evaluating fork after withholding (FAW) attack in Bitcoin., , , , and . CF, page 67-74. ACM, (2022)