Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tap Delay-and-Accumulate Cost Aware Coefficient Synthesis Algorithm for the Design of Area-Power Efficient FIR Filters., , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 65-I (2): 712-722 (2018)Understanding Domain Generalization: A Noise Robustness Perspective., and . CoRR, (2024)Graph Pattern Matching: Capturing Bisimilar Subgraph., , , and . Int. J. Pattern Recognit. Artif. Intell., 35 (3): 2150011:1-2150011:18 (2021)Computationally instrument-resolution-independent de novo peptide sequencing for high-resolution devices., , , , , , and . Nat. Mach. Intell., 3 (5): 420-425 (2021)Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks., , , and . IACR Cryptol. ePrint Arch., (2019)The Long-distance Engine Fault Diagnosis by Virtual Instrument Founding on MKDE., and . CCCT (1), page 23-25. The International Institute of Informatics and Systemics (IIIS), (2004)Probabilistic Modal Kleene Algebra and Hoare-Style Logic., , and . ICNC (3), page 652-661. IEEE Computer Society, (2008)Mixed-Domain and Reduced-Order Modeling of Electroosmotic Transport in Bio-MEMS., and . BMAS, page 51-56. IEEE Computer Society, (2000)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)针对车联网认证方案CPAV和ABV的安全分析 (Security Analysis on VANETs Authentication Schemes: CPAV and ABV)., , and . 计算机科学, 46 (4): 177-182 (2019)