Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach., , , , , , , , , and 4 other author(s). AGI, volume 171 of Frontiers in Artificial Intelligence and Applications, page 107-121. IOS Press, (2008)Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics., , , and . SEC, volume 147 of IFIP, page 83-100. Kluwer / Springer, (2004)11.1 A 512Gb 3b/cell flash memory on 64-word-line-layer BiCS technology., , , , , , , , , and 47 other author(s). ISSCC, page 196-197. IEEE, (2017)Self-Verifying Execution (Position Paper)., , , and . SecDev, page 117-123. IEEE Computer Society, (2016)TiCA: A Tibetan Text Compression Algorithm., , , and . AIAM, page 8-12. ACM, (2020)Unauthorized origin crossing on mobile platforms: threats and mitigation., , , and . ACM Conference on Computer and Communications Security, page 635-646. ACM, (2013)Location-Aware Hypergraph Coloring Based Spectrum Allocation for D2D Communication., , and . ISWCS, page 1-6. IEEE, (2018)Vacancy-mediated anomalous phononic and electronic transport in defective half-Heusler ZrNiBi, , , , , , , , , and 7 other author(s). Nat. Commun, 14 (1): 4722-- (Aug 5, 2023)A sub-action aided deep reinforcement learning framework for latency-sensitive network slicing., , , , , and . Comput. Networks, (2022)3D hemisphere-based convolutional neural network for whole-brain MRI segmentation., , , , , , , , and . Comput. Medical Imaging Graph., (2022)