Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights., , and . CoRR, (2023)Software Tamper Resistance Based on White-Box SMS4 Implementation., , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 486-495. Springer, (2019)Converting normal DLP-based signatures into blind.. Appl. Math. Comput., 170 (1): 657-665 (2005)Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure., , and . IEEE Internet Things J., 8 (11): 9189-9205 (2021)Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems., , , , and . CSCWD (Selected papers), volume 3865 of Lecture Notes in Computer Science, page 636-645. Springer, (2005)Fast on-line real-time scheduling algorithm for reconfigurable computing., , , and . CSCWD (2), page 793-798. IEEE Computer Society, (2005)1-84600-002-5.P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Scale Invariant Domain Generalization Image Recapture Detection., , , , and . ICONIP (4), volume 13111 of Lecture Notes in Computer Science, page 75-86. Springer, (2021)Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 252-264 (2018)Bagging very weak learners with lazy local learning., , and . ICPR, page 1-4. IEEE Computer Society, (2008)