Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A real-time digital VCR encode/decode and MPEG-2 decode LSI implemented on a dual-issue RISC processor., , , , , , , , and . IEEE J. Solid State Circuits, 34 (7): 992-1000 (1999)Detecting Malicious JavaScript Using Structure-Based Analysis of Graph Representation., , , , , , and . IEEE Access, (2023)Strength changes due to the immersion for poly(lactic acid) test pieces made by 3D printer., , , and . MHS, page 1-5. IEEE, (2019)Experimental Analysis of Public Wireless LAN Quality for Moving Users., , , and . VTC Fall, page 1-5. IEEE, (2014)EDCA Based Congestion Control for WLAN Mesh Networks., , , and . VTC Spring, page 1288-1292. IEEE, (2006)Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation., , , and . IEICE Trans. Inf. Syst., 92-D (10): 1961-1970 (2009)Peek-a-boo, I Can See You, Forger: Influences of Human Demographics, Brand Familiarity and Security Backgrounds on Homograph Recognition., , , , and . CoRR, (2019)Dynamic contrast-enhanced computed tomography diagnosis of primary liver cancers using transfer learning of pretrained convolutional neural networks: Is registration of multiphasic images necessary?, , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 14 (8): 1295-1301 (2019)A Comprehensive Security Analysis Checksheet for OpenFlow Networks., , , , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 231-242. Springer, (2016)Service Independent Access Control Architecture for User Generated Content (UGC)., , and . Security and Management, page 220-226. CSREA Press, (2008)