Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Quadband Doherty Power Amplifier With Large Power Back-Off Range., , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (9): 3598-3610 (2021)Design of an Ultra-Wideband High-Efficiency Power Amplifier Based on a Novel Impedance Matching Structure With Three Paths., , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 70 (11): 3973-3977 (November 2023)Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT., , , , , , and . IEEE Internet Things J., 10 (16): 14856-14872 (August 2023)Secure string pattern query for open data initiative., , , , and . J. Inf. Secur. Appl., (2019)Network security defense model based on firewall and IPS., , and . J. Intell. Fuzzy Syst., 39 (6): 8961-8969 (2020)TuFast: A Lightweight Parallelization Library for Graph Analytics., , and . ICDE, page 710-721. IEEE, (2019)Live Demonstration: Wearable Body Area Network System Based on Low Power Body Channel Communication., , , and . BioCAS, page 1. IEEE, (2019)A Mixed Integer Linear Programming Model for Production Scheduling of Non-Pipelined Wells., , , , and . ICCA, page 1397-1404. IEEE, (2019)Active hashing with joint data example and tag selection., , , and . SIGIR, page 405-414. ACM, (2014)An Almost Non-interactive Order Preserving Encryption Scheme., , , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 87-100. Springer, (2018)