Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and simulation of a model for intracellular drug accumulation in tumors., and . Appl. Math. Comput., 176 (2): 577-593 (2006)A new fuzzy-rough feature selection algorithm for mammographic risk analysis., , , and . ICNC-FSKD, page 934-939. IEEE, (2016)Improvements on Making BKW Practical for Solving LWE., , , , and . Cryptogr., 5 (4): 31 (2021)Image deep clustering based on local-topology embedding., , , and . Pattern Recognit. Lett., (2021)Causal Adversarial Autoencoder for Disentangled SAR Image Representation and Few-Shot Target Recognition., , and . IEEE Trans. Geosci. Remote. Sens., (2023)A Novel Edge Effect Detection Method for Real-Time Cellular Analyzer Using Functional Principal Component Analysis., , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (5): 1563-1572 (2020)Modified DV-Hop Localization Algorithm Based on Intersecting Circle and Hops Revaluation., , , , , and . ICIIP, page 33-39. ACM, (2018)SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes., , , and . ASIACRYPT (4), volume 14441 of Lecture Notes in Computer Science, page 203-236. Springer, (2023)Modeling and research of three-phase inverter powering nonlinear load., , , , , and . ISIE, page 331-336. IEEE, (2015)Modeling the Process of Information Encountering Based on the Analysis of Secondary Data., , , and . iConference, volume 11420 of Lecture Notes in Computer Science, page 41-49. Springer, (2019)