Author of the publication

Numerical analyses ridge-forming for whole film-mulching and double ridge-furrow, a discrete element method.

, , , , , and . Comput. Electron. Agric., (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments., , , , and . Comput. Electron. Agric., (2023)Towards Transparent Debugging., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 321-335 (2018)STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles., , and . CoRR, (2022)Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models., , , , , and . CoRR, (2024)A Framework to Secure Peripherals at Runtime., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 219-238. Springer, (2014)Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices., , , , , and . IEEE Internet Things J., 9 (12): 10093-10107 (2022)An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles., , , and . IEEE Trans. Intell. Veh., 5 (4): 545-555 (2020)Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM"., and . IEEE Trans. Inf. Forensics Secur., (2021)Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels., , , and . IEEE Trans. Inf. Forensics Secur., 13 (6): 1535-1550 (2018)User-friendly deniable storage for mobile devices., , , , , , and . Comput. Secur., (2018)