Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental quantum repeater without quantum memory, , , , , , , , , and 4 other author(s). (2019)cite arxiv:1908.05351Comment: Published online in Nature Photonics.Reducing uncertainty of dynamic heterogeneous information networks: a fusing reconstructing approach., , , and . Data Min. Knowl. Discov., 31 (3): 879-906 (2017)Concrete hyperheuristic framework for test case prioritization., , , and . Journal of Software: Evolution and Process, (2018)Membership Inference Attacks Against Text-to-image Generation Models., , , , and . CoRR, (2022)Track Circuits Fault Diagnosis Method Based on the UNet-LSTM Network (ULN)., , and . J. Electr. Comput. Eng., (2024)Data-Driven Techniques in Disaster Information Management., , , , , , , , , and 3 other author(s). ACM Comput. Surv., 50 (1): 1:1-1:45 (2017)New attacks and security model of the secure flash disk., , , and . Math. Comput. Model., 57 (11-12): 2605-2612 (2013)A Compact TF-Based LC-VCO with Ultra-Low-Power Operation and Supply Pushing Reduction for IoT Applications., , , , , , , , , and . IEICE Trans. Electron., 103-C (10): 505-513 (2020)An Interactive Visualization System for Network Security Data., , and . J. Signal Process. Syst., 95 (2-3): 393-405 (March 2023)Redactable Blockchain From Decentralized Chameleon Hash Functions., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)