Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved method for concept location during Program Comprehension., and . SNPD, page 106-111. IEEE Computer Society, (2004)P-M equation based multiscale decomposition and its application to image fusion., and . Pattern Anal. Appl., 17 (1): 167-178 (2014)Image fusion using multiscale edge-preserving decomposition based on weighted least squares filter., and . IET Image Processing, 8 (3): 183-190 (2014)Interface-Based Side Channel Attack Against Intel SGX., , , and . CoRR, (2018)Boost Clickbait Detection Based on User Behavior Analysis., , , , and . APWeb/WAIM (2), volume 10367 of Lecture Notes in Computer Science, page 73-80. Springer, (2017)An optimal structure design of artificial load based on certain frequency., , , , and . ROBIO, page 1355-1360. IEEE, (2016)FADE: Detecting forwarding anomaly in software-defined networks., , and . ICC, page 1-6. IEEE, (2016)Software-Defined Label Switching: Scalable Per-Flow Control in SDN., , , , , and . IWQoS, page 1-10. IEEE, (2018)The movement from monoliths to component-based network elements., , , , and . IEEE Commun. Mag., 39 (1): 86-93 (2001)A Software Defined High-Speed CameraLink Image Data Transmission System Based on Pixel Clock Recovery., , , , and . Autom. Control. Comput. Sci., 56 (5): 403-410 (2022)