Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain., , , , , , and . IEEE Internet Things J., 9 (4): 2722-2733 (2022)Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain., , , , , and . IEEE Trans. Ind. Informatics, 16 (4): 2677-2686 (2020)AgileNet: Lightweight Dictionary-based Few-shot Learning., , , , and . CoRR, (2018)A Novel SiC Superjunction Trench MOSFET with Integrated Heterojunction Diode for Improved Performance., , , , , and . ASICON, page 1-4. IEEE, (2023)Sparse Representation for Signal Classification., and . NIPS, page 609-616. MIT Press, (2006)Edge-directed inference for microaneurysms detection in digital fundus images., , and . Medical Imaging: Image Processing, volume 6512 of SPIE Proceedings, page 651237. SPIE, (2007)Robust optic disk detection in retinal images using vessel structure and radon transform., and . Medical Imaging: Image Processing, volume 6144 of SPIE Proceedings, page 61444O. SPIE, (2006)IC laser trimming speed-up through wafer-level spatial correlation modeling., , , , , , and . ITC, page 1-7. IEEE Computer Society, (2014)MVPTrack: Energy-Efficient Places and Motion States Tracking., , , and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 721-725. Springer, (2013)Parametric counterfeit IC detection via Support Vector Machines., , and . DFT, page 7-12. IEEE Computer Society, (2012)