Author of the publication

Low power, high linearity multi-mode downconversion mixer for SDR.

, , , , and . ISCAS, page 737-740. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Efficiency Differential RF Front-End for a Gen2 RFID Tag., , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 58-II (4): 189-194 (2011)Trust-aware generative adversarial network with recurrent neural network for recommender systems., , , , , and . Int. J. Intell. Syst., 36 (2): 778-795 (2021)DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems., , , , , , and . IEEE Trans. Ind. Informatics, 18 (1): 345-355 (2022)A low-power low-noise amplifier for EEG/ECG signal recording applications., , and . ASICON, page 145-148. IEEE, (2011)A 0.8ps minimum-resolution sub-exponent TDC for ADPLL in 0.13µm CMOS., , , and . ASICON, page 602-605. IEEE, (2011)Super-speed up robust features image geometrical registration algorithm., , and . IET Image Processing, 10 (11): 848-864 (2016)A low power TDC with 0.5ps resolution for ADPLL in 40nm CMOS., , , , , and . ASICON, page 1-4. IEEE, (2015)Analysis and Modeling of Non-ideal Effects in SAR ADC., , , and . ASICON, page 1-4. IEEE, (2023)An 800MS/s, 6.7b ENOB Bootstrap Switching S/H IC for Wideband Direct RF Sub-Sampling Receiver in 45 nm CMOS., , , , and . ASICON, page 1-4. IEEE, (2021)A General Backdoor Attack to Graph Neural Networks Based on Explanation Method., , , , , and . TrustCom, page 759-768. IEEE, (2022)