Author of the publication

Unwanted turn-on of SiC JFET bi-directional switches under influence of parasitic parameters.

, , , , , and . IECON, page 4194-4199. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

English Teaching Platform Based on Online Education Technology and Licensure and Master's Program Technology., and . Int. J. Emerg. Technol. Learn., 14 (16): 154-164 (2019)The interval-valued hesitant Pythagorean fuzzy set and its applications with extended TOPSIS and Choquet integral-based method., , , and . Int. J. Intell. Syst., 34 (6): 1063-1085 (2019)Ex2: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks., , , and . Int. J. Intell. Syst., 37 (12): 11966-11984 (December 2022)GANAD: A GAN-based method for network anomaly detection., , , , and . World Wide Web (WWW), 26 (5): 2727-2748 (September 2023)云环境下APT攻击的防御方法综述 (Review of Defense Methods Against Advanced Persistent Threat in Cloud Environment)., , , and . 计算机科学, 43 (3): 1-7 (2016)Controlled Channel Attack Detection Based on Hardware Virtualization., , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 406-420. Springer, (2018)An h-p Version of the Discontinuous Galerkin Method for Volterra Integro-Differential Equations with Vanishing Delays., and . J. Sci. Comput., 81 (3): 2303-2330 (2019)A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services., , , , and . IEEE Trans. Computers, 73 (1): 58-72 (January 2024)Analyzing Adversarial Robustness of Deep Neural Networks in Pixel Space: a Semantic Perspective., , , , , , and . CoRR, (2021)A bi-projection model based on linguistic terms with weakened hedges and its application in risk allocation., , , and . Appl. Soft Comput., (2020)