Author of the publication

A low-cost cryptographic processor for security embedded system.

, , , , , and . ASP-DAC, page 113-114. IEEE, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial domain translation networks for integrating large-scale atlas-level single-cell datasets., , , , , , , , , and 153 other author(s). Nat. Comput. Sci., 2 (5): 317-330 (2022)Energy-stable Runge-Kutta schemes for gradient flow models using the energy quadratization approach., and . Appl. Math. Lett., (2019)The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithms., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 119-126. Springer, (2010)Modeling Users Behavior in Cellular Networks with Mobile Big Data., , , , , and . WOCC, page 1-5. IEEE, (2019)Smart Home Model based on Ontology and Context-awareness., and . GrC, page 830-833. IEEE, (2008)Structure-Preserving Numerical Approximations to a Non-isothermal Hydrodynamic Model of Binary Fluid Flows., , , and . J. Sci. Comput., 83 (3): 50 (2020)Interference-Aware Mobile Backscatter Communication: A PHY-Assisted Rate Adaptive Approach., , , , and . IEEE Trans. Mob. Comput., 22 (12): 7498-7508 (December 2023)A novel in-depth analysis approach for domain-specific problems based on multidomain data., , , , and . Inf. Sci., (2022)Explore Deep Neural Network and Reinforcement Learning to Large-scale Tasks Processing in Big Data., , , and . Int. J. Pattern Recognit. Artif. Intell., 33 (13): 1951010:1-1951010:29 (2019)Prediction model of a hybrid recurrent neural network based on sequence decomposition., , , , and . Int. J. Comput. Sci. Math., 18 (3): 286-298 (2023)