Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Information Security of College Ideology., and . ICIC (1), volume 9771 of Lecture Notes in Computer Science, page 571-579. Springer, (2016)SGDAT: An optimization method for binary neural networks., , , and . Neurocomputing, (October 2023)Latent Fingerprint Registration via Matching Densely Sampled Points., , , and . IEEE Trans. Inf. Forensics Secur., (2021)Latent Fingerprint Registration via Matching Densely Sampled Points., , , and . CoRR, (2020)Efficient Rectification of Distorted Fingerprints., , , and . IEEE Trans. Inf. Forensics Secur., 13 (1): 156-169 (2018)Latent Fingerprint Indexing: Robust Representation and Adaptive Candidate List., , , and . IEEE Trans. Inf. Forensics Secur., (2022)A Personalized Automated Bidding Framework for Fairness-aware Online Advertising., , , , , , , , , and . KDD, page 5544-5553. ACM, (2023)Non-Scan Design for Testability Based on Fault Oriented Conflict Analysis., , and . Asian Test Symposium, page 86-. IEEE Computer Society, (2002)A cost-effective scan architecture for scan testing with non-scan test power and test application cost., , , and . DAC, page 744-747. ACM, (2003)Non-Scan Design for Testability for Mixed RTL Circuits with Both Data Paths and Controller via Conflict Analysis., , and . Asian Test Symposium, page 300-305. IEEE Computer Society, (2003)