Author of the publication

Impact on the electrostatic field of electrostatic force microscope due to tip-sample distance and non-flat sample surface.

, , and . IECON, page 3966-3969. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Security and Privacy Issues in Internet-of-Things., , , , and . IEEE Internet of Things Journal, 4 (5): 1250-1258 (2017)Smooth Schedule of Large-scale Terrain Visualization from External Memory., , and . CAD/Graphics, page 34. IEEE, (2007)Reliability Model Construction for Complex System Based on Common Cause Failure Network., , and . Adv. Multim., (2014)Chain-structure time-delay reservoir computing for synchronizing chaotic signal and an application to secure communication., , and . EURASIP J. Adv. Signal Process., 2022 (1): 68 (2022)Self-attention Based Multimodule Fusion Graph Convolution Network for Traffic Flow Prediction., , , and . ICPCSEE (1), volume 1628 of Communications in Computer and Information Science, page 3-16. Springer, (2022)A Flexible Doubly Clamped Beam Energy Harvester with a Standard Rectifier Electric Circuit., , , , , and . HCC, volume 11354 of Lecture Notes in Computer Science, page 69-78. Springer, (2018)Type-Augmented Link Prediction Based on Bayesian Formula., , , and . ICPCSEE (2), volume 1880 of Communications in Computer and Information Science, page 304-317. Springer, (2023)Maximising influence in sensed heterogeneous social network with privacy preservation., , , , and . Int. J. Sens. Networks, 28 (2): 69-79 (2018)Kinematics and Simulation Analysis of a 3-DOF Mobile Handling Robot Based ADAMS and MATLAB., , , , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 582-587. Springer, (2017)Publishing histograms with outliers under data differential privacy., , , , , and . Secur. Commun. Networks, 9 (14): 2313-2322 (2016)