Author of the publication

Research on High Performance RFID Code Resolving Technology.

, and . IITSI, page 677-681. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Total ionizing dose radiation effect on the threshold voltage for the uniaxial strained Si nano NMOSFET., , , , , , and . IEICE Electron. Express, 14 (11): 20170411 (2017)An Enhanced Approach for Multiple Sensitive Attributes in Data Publishing., , and . SGIoT, volume 354 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 79-94. Springer, (2020)Research on High Performance RFID Code Resolving Technology., and . IITSI, page 677-681. IEEE Computer Society, (2010)Influence of γ-ray total dose radiation effect on the hot carrier gate current of the uniaxial strained Si nano-scale NMOSFET., , , , , and . Microelectron. Reliab., (2017)Research on Federated Sharing Methods for Massive Data in Blockchain., and . SGIoT, volume 557 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 12-27. Springer, (2023)Research on Clustering-Differential Privacy for Express Data Release., and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 427-437. Springer, (2017)A Distributed IR Model Based on Semantic Web., , , and . ASWC, volume 4185 of Lecture Notes in Computer Science, page 725-731. Springer, (2006)Removable Edges of a Spanning Tree in 3-Connected 3-Regular Graphs., , and . FAW, volume 4613 of Lecture Notes in Computer Science, page 337-345. Springer, (2007)An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks., , and . Secur. Commun. Networks, (2021)An Enhanced Location-Data Differential Privacy Protection Method Based on Filter., , and . SGIoT, volume 447 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 117-127. Springer, (2021)