Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters., , , and . CoRR, (2018)Dynamic connection pruning for densely connected convolutional neural networks., , , , , , , , and . Appl. Intell., 53 (16): 19505-19521 (August 2023)Research on Plaintext Restoration of AES Based on Neural Network., and . Secur. Commun. Networks, (2018)Multiperiod subscription pricing for cellular wireless entrants., , , , , and . CISS, page 326-330. IEEE, (2016)Regulating wireless access costs for not vertically integrated content providers., , and . CNSM, page 1-8. IEEE Computer Society, (2017)Low-power high-yield SRAM design with VSS adaptive boosting and BL capacitance variation sensing., , , , , and . ASICON, page 1-4. IEEE, (2013)Dual cross knowledge distillation for image super-resolution., , , , , and . J. Vis. Commun. Image Represent., (September 2023)Compressing Facial Makeup Transfer Networks by Collaborative Distillation and Kernel Decomposition., , , , and . VCIP, page 46-49. IEEE, (2020)High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU., , , , , and . ACM Trans. Embed. Comput. Syst., 22 (2): 25:1-25:35 (March 2023)One to One Identification of Cryptosystem Using Fisher's Discriminant Analysis., and . ACIT, page 7-12. ACM, (2018)