Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-dimensional optimization for approximate near-threshold computing., , , , and . Frontiers Inf. Technol. Electron. Eng., 21 (10): 1426-1441 (2020)A review of selection combining receivers over Nakagami-m correlated fading channels., and . Digit. Signal Process., (2018)Wireless Powered D2D Communication Security Using LSTM in Emergency Communication System., , , , and . WOCC, page 1-5. IEEE, (2019)Assessing and classifying risk of pipeline third-party interference based on fault tree and SOM., , , , and . Eng. Appl. Artif. Intell., 25 (3): 594-608 (2012)An electro-optical full-subtractor using hybrid-integrated silicon-graphene waveguides., , , , , and . ASICON, page 1-4. IEEE, (2019)Latency Optimization for Multi-user NOMA-MEC Offloading Using Reinforcement Learning., , , , and . WOCC, page 1-5. IEEE, (2019)An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge., , , , and . Int. J. Distributed Sens. Networks, (2013)An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors., , , , , and . HPCC/EUC, page 533-540. IEEE, (2013)Secure Data Storage and Recovery in Industrial Blockchain Network Environments., , , , and . IEEE Trans. Ind. Informatics, 16 (10): 6543-6552 (2020)GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids., , , and . IEEE Trans. Netw. Sci. Eng., 7 (2): 805-816 (2020)