Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive Evaluation and Application of GIS Insulation Condition Part 2: Construction and Application of Comprehensive Evaluation Model Considering Universality and Economic Value., , , , , and . IEEE Access, (2019)A self-attention based message passing neural network for predicting molecular lipophilicity and aqueous solubility., , , , , and . J. Cheminformatics, 12 (1): 15 (2020)SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization., , , , , , , , , and . USENIX Security Symposium, page 1239-1256. USENIX Association, (2019)KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines., , , , and . COMPSAC, page 757-766. IEEE, (2022)Balance Control for Inverted Pendulum System via SGCMG., , and . ICIRA (8), volume 14274 of Lecture Notes in Computer Science, page 120-129. Springer, (2023)Analysis of Influencing Factors of Shooting Rate Based on Trajectory Prediction of the Basketball., , , , , and . WISA, page 176-180. IEEE, (2017)LighTN: Light-weight Transformer Network for Performance-overhead Tradeoff in Point Cloud Downsampling., , , , , and . CoRR, (2022)SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks., , , , , , , , , and . CoRR, (2023)SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 827-840 (2023)Data-Free Generalized Zero-Shot Learning., , , , , and . AAAI, page 5108-5117. AAAI Press, (2024)