Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi adaptive hardware Trojan detection method based on power characteristics template., , , , , and . CCIS, page 414-418. IEEE, (2016)Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks., , , , , , and . IEEE Trans. Wirel. Commun., 23 (1): 423-435 (January 2024)The realization and optimization of path planning algorithm for autonomous mobile robot., , , , and . ICIIP, page 109-114. ACM, (2021)Research on Classification of Fine-Grained Rock Images Based on Deep Learning., , , and . Comput. Intell. Neurosci., (2021)Meta Security Metric Learning for Secure Deep Image Hiding., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (5): 4907-4920 (September 2024)Improved Design of Biogas Engineering Alarm Based on STM32., , , and . ICIIP, page 111-116. ACM, (2019)An Approach for Compliance Validation of Trusted Computing Applications., and . WKDD, page 574-579. IEEE Computer Society, (2008)A Cloud Computing Task Scheduling Strategy Based on Improved Particle Swarm Optimization., , , , and . ISBDAI, page 543-549. ACM, (2020)Design and optimization of multiplier base on FPGA., , , , and . ISBDAI, page 332-335. ACM, (2020)High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks., , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (2): 848-862 (2022)