Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comparison of Extended Kalman Filter and Levenberg-Marquardt methods for neural network training., , , and . LARC, page 1-5. IEEE, (2011)Updating Dynamic Noise Models With Moving Magnetoencephalographic (MEG) Systems., , , , , , , , , and 1 other author(s). IEEE Access, (2019)Prediction interval based on type-2 fuzzy systems for wind power generation and loads in microgrid control design., , and . FUZZ-IEEE, page 328-335. IEEE, (2016)Ant Colony Optimization Algorithm for the Multiyear Transmission Network Expansion Planning., , , , and . CEC, page 1-8. IEEE, (2018)Exploring the Vulnerability of R-LWE Encryption to Fault Attacks., , , and . CS2@HiPEAC, page 7-12. ACM, (2018)An Investigation of Sources of Randomness Within Discrete Gaussian Sampling., , , , , , and . IACR Cryptology ePrint Archive, (2017)A Distributed Model Predictive Control Strategy for Back-to-Back Converters., , , , , and . IEEE Trans. Ind. Electron., 63 (9): 5867-5878 (2016)Robust Energy Management System Based on Interval Fuzzy Models., , , , , and . IEEE Trans. Control. Syst. Technol., 24 (1): 140-157 (2016)Synthesis of Flexible Accelerators for Early Adoption of Ring-LWE Post-quantum Cryptography., , , , , and . ACM Trans. Embed. Comput. Syst., 19 (2): 11:1-11:17 (2020)Invited Paper: Instruction Set Extensions for Post-Quantum Cryptography., , and . ICCAD, page 1-6. IEEE, (2023)