Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Virtual Sample Generation Method Based on Differential Evolution Algorithm for Overall Trend of Small Sample Data: Used for Lithium-ion Battery Capacity Degradation Data., , , and . IEEE Access, (2019)An Effective Method for Combating Malicious Scripts Clickbots., , , and . ESORICS, volume 5789 of Lecture Notes in Computer Science, page 523-538. Springer, (2009)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , and . APSEC, page 355-362. IEEE, (2019)A robust group-based key management scheme for wireless sensor networks., and . WCNC, page 1915-1920. IEEE, (2005)A Graph-Based Investigation of Bitcoin Transactions., and . IFIP Int. Conf. Digital Forensics, volume 462 of IFIP Advances in Information and Communication Technology, page 79-95. Springer, (2015)Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy., and . SADFE, page 38-45. IEEE, (2020)A Dynamic Neural Network Approach for Efficient Control of Manipulators., , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (5): 932-941 (2019)Monaural speech separation based on MAXVQ and CASA for robust speech recognition., , , , and . Comput. Speech Lang., 24 (1): 30-44 (2010)A testbed for evaluation and analysis of stepping stone attack attribution techniques., , , , , , and . TRIDENTCOM, IEEE, (2006)Checkpointing-Aware Loop Tiling for Energy Harvesting Powered Nonvolatile Processors., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 38 (1): 15-28 (2019)