Author of the publication

Research on the application of low-polygon design to Chinese chess: -Take the Chinese chess "knight" as an example.

, , and . WSSE, page 199-204. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressed sensing based network tomography using end-to-end path measurements., , , , and . ICC, page 1-6. IEEE, (2017)DAHash: Distribution Aware Tuning of Password Hashing Costs., and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 382-405. Springer, (2021)Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking., , and . GameSec, volume 13061 of Lecture Notes in Computer Science, page 334-353. Springer, (2021)Online Fair Allocation in Autonomous Vehicle Sharing., , , , and . GLOBECOM, page 1-6. IEEE, (2017)Cost-asymmetric memory hard password hashing., , and . Inf. Comput., (2024)Mechanism Design in Defense Against Offline Password Attacks. Purdue University, USA, (2023)Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models., , and . SP, page 626-644. IEEE, (2023)Research on the application of low-polygon design to Chinese chess: -Take the Chinese chess "knight" as an example., , and . WSSE, page 199-204. ACM, (2021)Optimal Data Traffic Pricing in Socially-Aware Network: A Game Theoretic Approach., , , , and . GLOBECOM, page 1-6. IEEE, (2016)Social-Aware Content Sharing in D2D Communications: An Optimal Stopping Approach., , , , and . ICC, page 1-6. IEEE, (2018)