Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanism study on gear tooth surface texture in power honing process., , , , and . IJMR, 12 (2): 212-224 (2017)Enhanced reliability of hexagonal boron nitride dielectric stacks due to high thermal conductivity., , , , , , and . IRPS, page 6-1. IEEE, (2018)Research on Surface Defect Detection Technology Based on the Zonal and Time-Sharing Computational Imaging., , , and . IEEE Access, (2022)Keyword Semantic Extended Top-k Ciphertext Retrieval Scheme Over Hybrid Government Cloud Environment., , , , and . IEEE Access, (2021)Identification of important nodes in the information propagation network based on the artificial intelligence method., , and . CoRR, (2024)Detecting Malicious Switches for a Secure Software-defined Tactile Internet., , , , and . ACM Trans. Internet Techn., 21 (4): 84:1-84:23 (2021)An Optronic Processor for Ultra-Wideband Spectrum Awareness., , , and . IGARSS, page 1931-1934. IEEE, (2019)MTRC compensation in high-resolution ISAR imaging via improved polar format algorithm based on ICPF., , , and . EURASIP J. Adv. Signal Process., (2014)STEP-Based Research and Realization on CAD Data Transformation for Virtual Assembly., , and . CSIE (1), page 707-710. IEEE Computer Society, (2009)Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3196-3210 (July 2024)