From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of PPG and ECG synchronous acquisition system based on NRF52832., , , , , , и . ICCE-Taiwan, стр. 249-250. IEEE, (2023)A Method for ECG R-wave Denoising and Detecting., , , , , и . ICCE-TW, стр. 557-558. IEEE, (2022)The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links., , , , , , и . USENIX Security Symposium, стр. 19-36. USENIX Association, (2019)Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation., , , , , , , и . USENIX Security Symposium, стр. 625-642. USENIX Association, (2023)Cross Container Attacks: The Bewildered eBPF on Clouds., , , , , , , и . USENIX Security Symposium, стр. 5971-5988. USENIX Association, (2023)Guide to Match: Multi-Layer Feature Matching With a Hybrid Gaussian Mixture Model., , и . IEEE Trans. Multim., 22 (9): 2246-2261 (2020)LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection., , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 291-311. Springer, (2017)R²MRF: Defocus Blur Detection via Recurrently Refining Multi-Scale Residual Features., , , , , , , и . AAAI, стр. 12063-12070. AAAI Press, (2020)Mitral Valve Regurgitation: Assessment with Dual Source Computed Tomography., , , , , и . CinC, стр. 827-830. www.cinc.org, (2013)Towards a Believable Decoy System: Replaying Network Activities from Real System., , и . CNS, стр. 1-9. IEEE, (2020)