Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Carryable Intravenous Drip Frame with Automatic Balancing., , , , , and . Sensors, 20 (3): 793 (2020)Carryable and automatically balanced intravenous drip frame and using method thereof., , , and . WOCC, page 1-2. IEEE, (2018)Fast online classification of network traffic using new feature-embedded hierarchical structure., , , , , and . Comput. Networks, (December 2023)Arc-transitive Cayley graphs on nonabelian simple groups with prime valency., , , and . J. Comb. Theory, Ser. A, (2021)Semi-supervised ranking SVM-assisted IGA with hierarchical evaluations., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)A New Hybrid Approach for Medical Image Intelligent Classifying Using Improved Wavelet Neural Network., , , and . ICONIP (2), volume 8227 of Lecture Notes in Computer Science, page 490-495. Springer, (2013)Tight security bounds for key-alternating ciphers., and . IACR Cryptology ePrint Archive, (2013)Safe device driver model based on kernel-mode JVM., , , and . VTDC@SC, page 3:1-3:8. ACM, (2007)Provable Security Analysis of FIDO2., , , and . IACR Cryptol. ePrint Arch., (2020)Survey on Run-to-Run Control Algorithms in High-Mix Semiconductor Manufacturing Processes., , , and . IEEE Trans. Ind. Informatics, 11 (6): 1435-1444 (2015)