Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Classification Method of EEG Motor Imagery Based on INFO-LSSVM., , , , , , and . ICCPR, page 471-477. ACM, (2022)Leveraging Conditional Statement to Generate Acceptance Tests Automatically via Traceable Sequence Generation., , , , and . QRS, page 394-405. IEEE, (2023)Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph., , , , , , , , and . ICWE, volume 10845 of Lecture Notes in Computer Science, page 33-49. Springer, (2018)FBLE: A Feature-based Label Enhancement Method for Corporate Bond Credit Rating Prediction., , , , , and . SmartCloud, page 73-77. IEEE, (2021)Alignment-Aware Word Distance., , , , , , and . PAKDD (1), volume 13935 of Lecture Notes in Computer Science, page 418-429. Springer, (2023)Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach., , , , , , , and . HOST, page 13-18. IEEE Computer Society, (2010)Thickness-Independent Measurement of Grain Moisture Content by Attenuation and Corrected Phase Shift of Microwave Signals at Multiple Optimized Frequencies., , , , , , and . IEEE Trans. Ind. Electron., 69 (11): 11785-11795 (2022)An Ensemble Approach for Detecting Anomalous User Behaviors., , , , , , and . International Journal of Software Engineering and Knowledge Engineering, 28 (11-12): 1637-1656 (2018)TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection., , , , and . HOST, page 71-74. IEEE Computer Society, (2011)DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link Recovery., , , , , , and . SANER, page 434-444. IEEE, (2019)