Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual-pathway Attention based Supervised Adversarial Hashing for Cross-modal Retrieval., , , and . BigComp, page 168-171. IEEE, (2021)Aging Adaption in Integrated Circuits Using a Novel Built-In Sensor., , , , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 34 (1): 109-121 (2015)TRO: An On-Chip Ring Oscillator-Based GHz Transient IR-Drop Monitor., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 36 (5): 855-868 (2017)Research on Multi-Dimensional Dynamic Clustering Method of Big Data Alliance Users., , , and . WHICEB, page 29. Association for Information Systems, (2020)The Impact of Anti-phishing Laws on IT and Security Investment., , , and . PACIS, page 60. (2019)A Machine Learning Approach for Beamforming in UDN Considering Selfish and Altruistic Balance., , , , and . VTC Spring, page 1-6. IEEE, (2020)Visual Analysis of Research on Blockchain., , , and . SMC, page 718-723. IEEE, (2022)Dynamic Group Purchase Model and Group Algorithm in E-commerce Environment.. WAC, page 301-305. IEEE, (2022)DOST: Dynamically obfuscated wrapper for split test against IC piracy., , , , and . AsianHOST, page 1-6. IEEE Computer Society, (2017)AES Design Improvements Towards Information Security Considering Scan Attack., , , , , and . TrustCom/BigDataSE, page 322-326. IEEE, (2018)