Author of the publication

A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.

, , , , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 322-339. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Architecture Model for Multiple Disease Management Information Systems., , , , , , , , , and 4 other author(s). J. Medical Syst., 37 (2): 9931 (2013)Attention-guided Erasing - Novel Augmentation Method for Enhancing Downstream Breast Density Classification., , , , , and . Bildverarbeitung für die Medizin, page 13-18. Springer, (2024)Deep Auto-Encoder and Deep Forest-Assisted Failure Prognosis for Dynamic Predictive Maintenance Scheduling., , , and . Sensors, 21 (24): 8373 (2021)SemiMAR: Semi-Supervised Learning for CT Metal Artifact Reduction., , , , , , and . IEEE J. Biomed. Health Informatics, 27 (11): 5369-5380 (November 2023)MetaGSCA: A tool for meta-analysis of gene set differential coexpression., , , , , , , , , and . PLoS Comput. Biol., (2021)Multi-Scale Feature Fusion Convolutional Neural Network for Indoor Small Target Detection., , , , , , , and . Frontiers Neurorobotics, (2022)Distilling Ordinal Relation and Dark Knowledge for Facial Age Estimation., , , and . IEEE Trans. Neural Networks Learn. Syst., 32 (7): 3108-3121 (2021)A Unified Power-Setpoint Tracking Algorithm for Utility-Scale PV Systems with Power Reserves and Fast Frequency Response Capabilities., , , and . CoRR, (2021)Synthesizing Tensor Transformations for Visual Self-attention., , , , , , and . CoRR, (2022)Application of Data Encryption in Chinese Named Entity Recognition., , , , , , , and . CoRR, (2022)