Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Resource Allocation Design for Secure IRS-Aided WPCN., , , , and . IEEE Trans. Wirel. Commun., 22 (4): 2715-2729 (April 2023)An empirical study on the evaluation system of innovation and entrepreneurship education in applied universities., , , and . Comput. Appl. Eng. Educ., 31 (1): 100-116 (January 2023)A Benchmark and Asymmetrical-Similarity Learning for Practical Image Copy Detection., , and . CoRR, (2022)Understanding TEE Containers, Easy to Use? Hard to Trust., , , , , , and . CoRR, (2021)OpenFedLLM: Training Large Language Models on Decentralized Private Data via Federated Learning., , , , , , , , and . CoRR, (2024)Real-Time Video Super-Resolution with Spatio-Temporal Modeling and Redundancy-Aware Inference., , , , and . Sensors, 23 (18): 7880 (September 2023)Attentive WaveBlock: Complementarity-Enhanced Mutual Networks for Unsupervised Domain Adaptation in Person Re-Identification and Beyond., , , and . IEEE Trans. Image Process., (2022)Object Flow Integrity., , and . CCS, page 1909-1924. ACM, (2017)Notes on Rainbow Distinguished Point Method.. CoRR, (2015)CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software., , , , and . USENIX Security Symposium, page 1805-1821. USENIX Association, (2019)