Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan-horse attacks on quantum key distribution with classical Bob., , and . Quantum Inf. Process., 14 (2): 681-686 (2015)Storage availability of one-shot system under periodic inspection considering inspection error., and . Reliab. Eng. Syst. Saf., (2019)Cost-sharing contract design between manufacturer and dealership considering the customer low-carbon preferences., , , , and . Expert Syst. Appl., 213 (Part): 118877 (2023)Determining the inspection intervals for one-shot systems with support equipment., and . Reliab. Eng. Syst. Saf., (2018)Kronecker-Basis-Representation Based Tensor Sparsity and Its Applications to Tensor Recovery., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 40 (8): 1888-1902 (2018)Enhanced Open-Circuit Voltage of Wide-Bandgap Perovskite Photovoltaics by Using Alloyed (FA1–xCsx)Pb(I1–xBrx)3 Quantum Dots, , , , , , , , , and . ACS Energy Letters, 4 (8): 1954--1960 (July 2019)Measurement of CFRP surface crack based on electromagnetic measuring system., , , , , , , , and . I2MTC, page 1-5. IEEE, (2019)High efficiency perovskite quantum dot solar cells with charge separating heterostructure, , , , , , , , , and 4 other author(s). Nature Communications, 10 (1): 2842-- (2019)An automatic FPGA design and implementation framework., , , , and . FPL, page 1-4. IEEE, (2013)A logic cell architecture exploiting the shannon expansion for the reduction of configuration memory., , , , , and . FPL, page 1-6. IEEE, (2014)