Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy in the Genomic Era., , , , , , , and . ACM Comput. Surv., 48 (1): 6:1-6:44 (2015)Local Importance Representation Convolutional Neural Network for Fine-Grained Image Classification., , and . Symmetry, 10 (10): 479 (2018)Using Web-Referral Architectures to Mitigate Denial-of-Service Threats., and . IEEE Trans. Dependable Secur. Comput., 7 (2): 203-216 (2010)Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN., , , , and . ICSCA, page 210-216. ACM, (2019)Sampled-data stabilization of a class of nonlinear differential algebraic systems via partial-state and output feedback., , , , , , and . J. Frankl. Inst., 357 (8): 4742-4758 (2020)A Battery Management System With a Lebesgue-Sampling-Based Extended Kalman Filter., , , , , and . IEEE Trans. Ind. Electron., 66 (4): 3227-3236 (2019)High-performance docker integration scheme based on OpenStack., , , , and . World Wide Web, 23 (4): 2593-2632 (2020)Flexible call admission control for multiclass services in wireless LANs., , and . Int. J. Wirel. Mob. Comput., 1 (3/4): 239-251 (2006)Semidefinite programming relaxation approach for multiuser detection of QAM signals., , and . IEEE Trans. Wirel. Commun., 6 (12): 4275-4279 (2007)NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment., , and . ISCC, page 1-6. IEEE, (2020)