Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision., , , , and . IEEE Access, (2019)Color image compression and encryption scheme based on compressive sensing and double random encryption strategy., , , , , and . Signal Process., (2020)Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy., , , , and . Signal Process., (2020)Data-Pattern-Aware Error Prevention Technique to Improve System Reliability., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (4): 1433-1443 (2017)Preplacement Net Length and Timing Estimation by Customized Graph Neural Network., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4667-4680 (2022)Nonvolatile Memories as the Data Storage System for Implantable ECG Recorder., , , , and . ACM J. Emerg. Technol. Comput. Syst., 8 (2): 13:1-13:16 (2012)Analog, In-memory Compute Architectures for Artificial Intelligence., , , , , and . CoRR, (2023)Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure., , , and . CoRR, (2021)FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices., , , , , , , and . CoRR, (2022)Fast IR Drop Estimation with Machine Learning., , , , and . CoRR, (2020)