Author of the publication

A 28nm 77.35TOPS/W Similar Vectors Traceable Transformer Processor with Principal-Component-Prior Speculating and Dynamic Bit-wise Stationary Computing.

, , , , , , , , , , and . VLSI Technology and Circuits, page 1-2. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-stamp based mutual authentication protocol for mobile RFID system., , and . WOCC, page 702-706. IEEE, (2013)HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset., , , , and . APCC, page 677-682. IEEE, (2013)New Classes of Ternary Bent Functions from the Coulter-Matthews Bent Functions., , and . CoRR, (2017)New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions., , and . IEEE Trans. Inf. Theory, 64 (6): 4653-4663 (2018)RMI-DRE: a redundancy-maximizing identification scheme for data redundancy elimination., , , and . Sci. China Inf. Sci., 59 (8): 089301:1-089301:3 (2016)Local segment-shared protection based on source egress gateway selection for multi-domain optical mesh networks., , , , and . Sci. China Inf. Sci., 54 (2): 227-235 (2011)An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers., and . FSKD, page 2111-2114. IEEE, (2012)Analytical results towards fuzzy error bound of indoor neighbor matching based positioning algorithm., , , , and . J. Intell. Fuzzy Syst., 38 (4): 3675-3686 (2020)Intelligent Vulnerability Analysis for Connectivity and Critical-Area Integrity in IoV., , , , and . IEEE Access, (2020)Features extraction and analysis for device-free human activity recognition based on channel statement information in b5G wireless communications., , , , , and . EURASIP J. Wireless Comm. and Networking, 2020 (1): 36 (2020)