Author of the publication

The Improvement and Implementation of iSLIP Algorithm Based on FPGA.

, , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 260-266. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypothesis Validation of Far-Wall Brightness in Carotid-Artery Ultrasound for Feature-Based IMT Measurement Using a Combination of Level-Set Segmentation and Registration., , , , , , , and . IEEE Trans. Instrumentation and Measurement, 61 (4): 1054-1063 (2012)Classification of disturbance vectors for collision attack in SHA-1., , and . Sci. China Inf. Sci., 58 (11): 1-10 (2015)New strategy for searching disturbance vector of SHA-1 collision attack., , , and . Sci. China Inf. Sci., 60 (12): 129101:1-129101:3 (2017)Joint learning of visual and spatial features for edit propagation from a single image., and . Vis. Comput., 36 (3): 469-482 (2020)Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR., , , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 192-200. Springer, (2008)Convergence of the High-Accuracy Algorithm for Solving the Dirichlet Problem of the Modified Helmholtz Equation., and . Complex., (2020)Search framework for neutral bits and boomerangs in SHA-1 collision attacks., , and . IET Inf. Secur., 17 (4): 647-663 (July 2023)Automatic recognition and validation of the common carotid artery wall segmentation in 100 longitudinal ultrasound images: an integrated approach using feature selection, fitting and classification., , and . Medical Imaging: Image Processing, volume 7623 of SPIE Proceedings, page 76233W. SPIE, (2010)Ultrasound IMT measurement on a multi-ethnic and multi-institutional database: Our review and experience using four fully automated and one semi-automated methods., , , , , , , , , and 1 other author(s). Comput. Methods Programs Biomed., 108 (3): 946-960 (2012)Reconfigurable Feedback Shift Register Based Stream Cipher for Wireless Sensor Networks., , and . IEEE Wirel. Commun. Lett., 2 (5): 559-562 (2013)