Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the expected penalty function for a risk model perturbed by diffusion., and . Int. J. Comput. Appl. Technol., 43 (2): 140-146 (2012)A Survey on Side-Channel Attacks of Strong PUF., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 74-85. Springer, (2020)Speech SIMCLR: Combining Contrastive and Reconstruction Objective for Self-supervised Speech Representation Learning., , , , , , and . CoRR, (2020)One-stage self-distillation guided knowledge transfer for long-tailed visual recognition., , , , , and . Int. J. Intell. Syst., 37 (12): 11893-11908 (December 2022)On the Security of Huang-Chang Multi-signature Schemes., and . Int. J. Netw. Secur., 5 (1): 62-65 (2007)An Optimized Low-Power Optical Memory Access Network for Kilocore Systems., , , and . IEICE Trans. Inf. Syst., 102-D (5): 1085-1088 (2019)Multiple Sound Source Localization Exploiting Robot Motion and Approaching Control., , , , and . IEEE Trans. Instrum. Meas., (2023)Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools., , , , , , and . TASE, page 65-72. IEEE, (2019)eQTL Viewer: visualizing how sequence variation affects genome-wide transcription., , and . BMC Bioinform., (2007)Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing., , , , , , , , , and . LCTES, page 74-84. ACM, (2020)