Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building topology-aware overlays using global soft-state, , and . Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on, page 500- 508. (2003)iSPY: Detecting IP Prefix Hijacking on My Own., , , , and . IEEE/ACM Trans. Netw., 18 (6): 1815-1828 (2010)Progressive multiple alignment with constraints., , , and . RECOMB, page 220-225. ACM, (1997)Winnowing sequences from a database search., , , , and . RECOMB, page 50-58. ACM, (1999)An Improved PSO Algorithm for Battery Parameters Identification Optimization Based on Thevenin Battery Model., , , , and . CCIS, page 295-298. IEEE, (2018)Public Data Integrity Checking for Cloud Storage with Privacy Preserving., , , , , and . ICCT, page 1408-1412. IEEE, (2019)TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors., , , , , , , and . EuroS&P, page 684-702. IEEE, (2022)Rasterized Storage Environments Automatically Designing and Planning Based on Monocular Camera., , , and . SMC, page 2882-2887. IEEE, (2021)Hardware evaluation of spike detection algorithms towards wireless brain machine interfaces., , and . BioCAS, page 60-64. IEEE, (2022)PaTAT: Human-AI Collaborative Qualitative Coding with Explainable Interactive Rule Synthesis., , , , , and . CHI, page 362:1-362:19. ACM, (2023)