Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Estimation of Range Difference and Range Rate Difference for Unknown Frequency Hopping Signals in Passive Localization., , and . IEEE Access, (2019)Refining Inaccurate Transmitter and Receiver Positions Using Calibration Targets for Target Localization in Multi-Static Passive Radar., , , , and . Sensors, 19 (15): 3365 (2019)Privacy-Preserving Decision Trees Evaluation via Linear Functions., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 494-512. Springer, (2017)Goten: GPU-Outsourcing Trusted Execution of Neural Network Training., , , , and . AAAI, page 14876-14883. AAAI Press, (2021)Towards Proofs of Ownership Beyond Bounded Leakage., and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 340-350. (2016)A New Evidence Combination Scheme for Decision Assistant., , and . CyberC, page 53-57. IEEE Computer Society, (2012)BG3: A Cost Effective and I/O Efficient Graph Database in Bytedance., , , , , , , , , and 7 other author(s). SIGMOD Conference Companion, page 360-372. ACM, (2024)Genomic analysis of a rare human tumor., , , , , , , , , and 24 other author(s). BMC Bioinform., 11 (S-4): O3 (2010)Updatable Block-Level Message-Locked Encryption., and . AsiaCCS, page 449-460. ACM, (2017)Joint Source Number Detection and DOA Estimation via Reversible Jump MCMC., , and . PACIIA (1), page 859-863. IEEE Computer Society, (2008)