Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 17 (2s): 71:1-71:21 (2021)A multi-image Joint Re-ranking framework with updateable Image Pool for person re-identification., , , , , , and . J. Vis. Commun. Image Represent., (2019)Understanding Internet of Things malware by analyzing endpoints in their static artifacts., , , , , , , , , and . Comput. Networks, (2022)Bitwise Collision Attack Based on Second-Order Distance., and . KSII Trans. Internet Inf. Syst., 11 (3): 1802-1819 (2017)New classes of NMDS codes with dimension 3., , and . Des. Codes Cryptogr., 92 (2): 397-418 (February 2024)Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card., , , , , and . CyberC, page 354-359. IEEE, (2019)Attribution of Economic Denial of Sustainability Attacks in Public Clouds., , and . EAI Endorsed Trans. Security Safety, 4 (13): e2 (2018)Practical two-dimensional correlation power analysis and its backward fault-tolerance., , , , and . Sci. China Inf. Sci., 60 (6): 68101 (2017)Rapid block matching based nonlinear registration on GPU for image guided radiation therapy., , , and . Medical Imaging: Image-Guided Procedures, volume 7625 of SPIE Proceedings, page 762511. SPIE, (2010)An Efficient Message-Attached Password Authentication Protocol and Its Applications in the Internet of Things., , and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 263-269. Springer, (2011)