Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries., , and . ICDIS, page 275-280. IEEE, (2018)A super-resolution method for low-quality face image through RBF-PLS regression and neighbor embedding., , , , and . ICASSP, page 1253-1256. IEEE, (2012)A portable TPM based on USB key., , and . ACM Conference on Computer and Communications Security, page 750-752. ACM, (2010)Distributed Adaptive Formation Tracking Control of Mobile Robots With Event-Triggered Communication and Denial-of-Service Attacks., , , and . IEEE Trans. Ind. Electron., 70 (4): 4077-4087 (2023)Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation., , , and . Inf. Sci., (2015)A network-based deep learning methodology for stratification of tumor mutations., , , , and . Bioinform., 37 (1): 82-88 (2021)Noise robust face hallucination employing Gaussian-Laplacian mixture model., , , and . Neurocomputing, (2014)Model-based Performance Evaluation of a Moving Target Defense System., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)Model Reference Adaptive Resilient Control of Uncertain Linear Systems with Intermittent DoS Attacks., , , and . IECON, page 3549-3555. IEEE, (2020)Manifold regularized sparse support regression for single image super-resolution., , , , and . ICASSP, page 1429-1433. IEEE, (2013)