Author of the publication

Thermal Covert Channels Leveraging Package-on-Package DRAM.

, , , , and . TrustCom/BigDataSE, page 319-326. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R-Map: A Map Metaphor for Visualizing Information Reposting Process in Social Media., , , and . IEEE Trans. Vis. Comput. Graph., 26 (1): 1204-1214 (2020)A NOMA Power Allocation Method Based on Greedy Algorithm., , , and . CSPS, volume 571 of Lecture Notes in Electrical Engineering, page 2304-2313. Springer, (2019)A novel small-world algorithm incorporating chaos optimization and its application to robot path planning., , , , and . J. Syst. Control. Eng., 226 (10): 1356-1370 (2012)Incremental localisation algorithm based on distance matrix in wireless sensor networks., and . Int. J. Inf. Commun. Technol., 11 (1): 38-47 (2017)Production scheduling for blocking flowshop in distributed environment using effective heuristics and iterated greedy algorithm., , and . Robotics Comput. Integr. Manuf., (2021)Modeling response of spring wheat yield to soil water and salt contents and its application in scheduling brackish water irrigation., , , and . Comput. Electron. Agric., (2022)The Spatiotemporal Pattern and Driving Factors of Cyber Fraud Crime in China., , , , , , , and . ISPRS Int. J. Geo Inf., 10 (12): 802 (2021)Prediction Errors Analysis and Correction on FCS-MPC for the Cascaded H-Bridge Multilevel Inverter., , , , and . IEEE Trans. Ind. Electron., 69 (8): 8264-8273 (2022)Cryptopaper: digital information security for physical documents., , , , , and . SAC, page 2157-2164. ACM, (2015)A millisecond quantum memory for scalable quantum networks, , , , , , , , , and . Nature Physics, 5 (2): 95--99 (Dec 7, 2008)