Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensionality Modulates Electrical Conductivity in Compositionally Constant One-, Two-, and Three-Dimensional Frameworks, , , , , , and . Journal of the American Chemical Society, 144 (12): 5583–5593 (March 2022)A Weighted-Time-Lag Method to Detect Lag Vegetation Response to Climate Variation: A Case Study in Loess Plateau, China, 1982-2013., , , and . Remote. Sens., 13 (5): 923 (2021)Magnetic Stripe Authentication System for Handheld Devices., , , , and . ICSPCC, page 1-5. IEEE, (2018)SafeMC: A System for the Design and Evaluation of Mode-Change Protocols., and . RTAS, page 105-116. IEEE Computer Society, (2018)DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay., , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 86-104. Springer, (2022)Dual‐Ion Intercalation and High Volumetric Capacitance in a Two‐Dimensional Non‐Porous Coordination Polymer, , , , and . Angewandte Chemie International Edition, 60 (52): 27119–27125 (November 2021)Atomically precise single-crystal structures of electrically conducting 2D metal--organic frameworks, , , , , , , , , and 11 other author(s). Nature Materials, 20 (2): 222--228 (Feb 1, 2021)High-rate, high-capacity electrochemical energy storage in hydrogen-bonded fused aromatics, , , , , , and . Joule, 7 (5): 986–1002 (May 2023)The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption., , , , , , and . NDSS, The Internet Society, (2023)StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT., , , and . Comput. Networks, (2024)