Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional optimization for approximate near-threshold computing., , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (10): 1426-1441 (2020)PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment., , , , , and . IEEE Access, (2019)MTR: Fault tolerant routing in Clos data center network with miswiring links., , , and . LANMAN, page 1-6. IEEE, (2014)Unveiling the resource consumption overhead of virtual machine consolidation in data centers., , , and . GLOBECOM, page 3262-3267. IEEE, (2012)A dynamic security association control scheme for efficient authentication in wireless networks., and . GLOBECOM, page 3778-3782. IEEE, (2004)Monocular vision based robot self-localization., , and . ROBIO, page 1189-1193. IEEE, (2010)Wireless Powered D2D Communication Security Using LSTM in Emergency Communication System., , , , and . WOCC, page 1-5. IEEE, (2019)An electro-optical full-subtractor using hybrid-integrated silicon-graphene waveguides., , , , , and . ASICON, page 1-4. IEEE, (2019)Latency Optimization for Multi-user NOMA-MEC Offloading Using Reinforcement Learning., , , , and . WOCC, page 1-5. IEEE, (2019)A review of selection combining receivers over Nakagami-m correlated fading channels., and . Digit. Signal Process., (2018)