Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Algorithm for Multichannel Eeg Compressed Sensing with Mixed Noise., , and . GlobalSIP, page 1-5. IEEE, (2019)Phishing page detection via learning classifiers from page layout feature., , , , , , and . EURASIP J. Wireless Comm. and Networking, (2019)Extensity of C3S EBSD Database and Its Structure Calculation., , and . DBTA, page 1-4. IEEE, (2010)Comparison of glass etching properties between HCl and HNO3 solution., , , , , , and . NEMS, page 562-566. IEEE, (2012)Particle Filtering for Adaptive Sensor Fault Detection and Identification., , and . ICRA, page 3807-3812. IEEE, (2006)Revisiting why Kad lookup fails., , , , , and . P2P, page 37-42. IEEE, (2012)The store-and-flood distributed reflective denial of service attack., , , , , and . ICCCN, page 1-8. IEEE, (2014)Modularized Morphing of Neural Networks., , and . CoRR, (2017)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 2333-2350. ACM, (2019)A large-scale empirical study of commit message generation: models, datasets and evaluation., , , , , , , and . Empir. Softw. Eng., 27 (7): 198 (2022)