Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discretization and discrimination methods for design, verification, and testing of analog/mixed-signal circuits., , , , , , and . CICC, page 1-8. IEEE, (2013)Deep learning-based citation recommendation system for patents., , , , , and . CoRR, (2020)Compact and Highly Efficient Short-Range Radar for Advanced Driver Assistant Systems., , , , and . IEEE Trans. Veh. Technol., 72 (2): 1629-1637 (February 2023)α-Stable convergence of heavy-tailed infinitely-wide neural networks., , , and . CoRR, (2021)Optimal Stream Gauge Network Design Using Entropy Theory and Importance of Stream Gauge Stations., , , , , , and . Entropy, 21 (10): 991 (2019)Development of an Explainable Fault Diagnosis Framework Based on Sensor Data Imagification: A Case Study of the Robotic Spot-Welding Process., , , and . IEEE Trans. Ind. Informatics, 18 (10): 6895-6904 (2022)Technology-Transferability Analysis of Universities and Public Research Institutes Using Deep Neural Networks., , , and . IEEE Access, (2023)A 12-Bit Mobile OLED/μLED Display Driver IC with Cascaded Loading-Free Capacitive Interpolation DAC and 6.24V/μs-Slew-Rate Buffer Amplifier., , , , , , , and . VLSI Circuits, page 1-2. IEEE, (2021)DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices., , , , , , and . USENIX Security Symposium, page 1325-1342. USENIX Association, (2022)Watching the Watchers: Practical Video Identification Attack in LTE Networks., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2022)