Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Saliency Maps for Adversarial Point-Cloud Generation., , , and . CoRR, (2018)Toward Secure and Dependable Storage Services in Cloud Computing., , , , and . IEEE Trans. Serv. Comput., 5 (2): 220-232 (2012)Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels., , and . IEEE J. Sel. Areas Commun., 30 (9): 1666-1674 (2012)Characterizing Impacts of Model Uncertainties in Quantitative Photoacoustics., and . SIAM/ASA J. Uncertain. Quantification, 8 (2): 636-667 (2020)Frequency Domain Optical Tomography Based on the Equation of Radiative Transfer., , and . SIAM J. Sci. Comput., 28 (4): 1463-1489 (2006)Atomos: Constant-Size Path Validation Proof., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (12): 2706-2716 (2016)A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things., , , and . CoRR, (2020)Quantitative Fluorescence Photoacoustic Tomography., and . SIAM J. Imaging Sci., 6 (4): 2404-2429 (2013)