Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of PPG and ECG synchronous acquisition system based on NRF52832., , , , , , and . ICCE-Taiwan, page 249-250. IEEE, (2023)A Method for ECG R-wave Denoising and Detecting., , , , , and . ICCE-TW, page 557-558. IEEE, (2022)Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments., , , , , and . ACM Conference on Computer and Communications Security, page 1001-1015. ACM, (2020)MTD 2014: First ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 1550-1551. ACM, (2014)Verification of data redundancy in cloud storage., , , and . SCC@ASIACCS, page 11-18. ACM, (2013)Email as a Master Key: Analyzing Account Recovery in the Wild., , and . INFOCOM, page 1646-1654. IEEE, (2018)SaCoseg: Object Cosegmentation by Shape Conformability., , and . IEEE Trans. Image Processing, 24 (3): 943-955 (2015)Multi-view Stereo Combined with Space Propagation and Pixel-Level Refinement., , and . ACPR, page 208-213. IEEE Computer Society, (2017)Rolling Guidance Based Scaled-Aware Spatial Sparse Unmixing for Hyperspectral Remote Sensing Imagery., , , and . IGARSS, page 4273-4276. IEEE, (2018)Disk storage isolation and verification in cloud., , , and . GLOBECOM, page 771-776. IEEE, (2012)