Author of the publication

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.

, , , and . J. Sensors, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Field-aware Neural Factorization Machine for Click-Through Rate Prediction., , , and . CoRR, (2019)Monte Carlo Neural Fictitious Self-Play: Achieve Approximate Nash equilibrium of Imperfect-Information Games., , , and . CoRR, (2019)Algorithmic Collusion in Cournot Duopoly Market: Evidence from Experimental Economics., , , and . CoRR, (2018)AppUsage2Vec: Modeling Smartphone App Usage for Prediction., , , , , , , and . ICDE, page 1322-1333. IEEE, (2019)Speeding up Deep Learning with Transient Servers., , , and . ICAC, page 125-135. IEEE, (2019)Perseus: Characterizing Performance and Cost of Multi-Tenant Serving for CNN Models., , and . CoRR, (2019)Modeling Files with Context Streams., , and . UIC, volume 6406 of Lecture Notes in Computer Science, page 322-336. Springer, (2010)Mining User Attributes Using Large-Scale APP Lists of Smartphones., , , , , , and . IEEE Syst. J., 11 (1): 315-323 (2017)WHO ARE THE SMARTPHONE USERS?: Identifying user groups with apps usage behaviors., , , , , , , and . GetMobile Mob. Comput. Commun., 21 (2): 31-34 (2017)A Monte Carlo Neural Fictitious Self-Play approach to approximate Nash Equilibrium in imperfect-information dynamic games., , , , , , and . Frontiers Comput. Sci., 15 (5): 155334 (2021)