Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision., , , , and . IEEE Access, (2019)Data-Pattern-Aware Error Prevention Technique to Improve System Reliability., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (4): 1433-1443 (2017)Communication-Efficient Vertical Federated Learning with Limited Overlapping Samples., , , , , , , , and . ICCV, page 5180-5189. IEEE, (2023)Net2: A Graph Attention Network Method Customized for Pre-Placement Net Length Estimation., , , , , and . ASP-DAC, page 671-677. ACM, (2021)Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure., , , and . CoRR, (2021)FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices., , , , , , , and . CoRR, (2022)Analog, In-memory Compute Architectures for Artificial Intelligence., , , , , and . CoRR, (2023)Nonvolatile Memories as the Data Storage System for Implantable ECG Recorder., , , , and . ACM J. Emerg. Technol. Comput. Syst., 8 (2): 13:1-13:16 (2012)Preplacement Net Length and Timing Estimation by Customized Graph Neural Network., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4667-4680 (2022)Introduction to the Special Issue on User-Centric Security and Safety for CPS., , , , , and . ACM Trans. Cyber Phys. Syst., 4 (3): 29:1-29:2 (2020)