Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing memory performance for FPGA implementation of pagerank., , and . ReConFig, page 1-6. IEEE, (2015)bitFA: A Novel Data Structure for Fast and Update-friendly Regular Expression Matching., , and . SIGCOMM Posters and Demos, page 130-132. ACM, (2017)Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test., , , , , and . IEEE Access, (2018)Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol., , , and . IEEE Trans. Parallel Distributed Syst., 24 (12): 2526-2537 (2013)A High-Utility Differentially Private Mechanism for Space Information Networks., , , , and . Remote. Sens., 14 (22): 5844 (2022)A Part-Based Deep Neural Network Cascade Model for Human Parsing., , and . IEEE Access, (2019)the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)Improving Laplace Mechanism of Differential Privacy by Personalized Sampling., , , , , and . TrustCom, page 623-630. IEEE, (2020)Multi-core Implementation of Decomposition-Based Packet Classification Algorithms., , and . PaCT, volume 7979 of Lecture Notes in Computer Science, page 105-119. Springer, (2013)Optimization of a Network Topology Generation Algorithm Based on Spatial Information Network., , and . ICPCSEE (1), volume 1879 of Communications in Computer and Information Science, page 246-255. Springer, (2023)