Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy., , , , and . Signal Process., (2020)Color image compression and encryption scheme based on compressive sensing and double random encryption strategy., , , , , and . Signal Process., (2020)Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision., , , , and . IEEE Access, (2019)Data-Pattern-Aware Error Prevention Technique to Improve System Reliability., , , and . IEEE Trans. Very Large Scale Integr. Syst., 25 (4): 1433-1443 (2017)Preplacement Net Length and Timing Estimation by Customized Graph Neural Network., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4667-4680 (2022)Low-Cost Floating-Point Processing in ReRAM for Scientific Computing., , , , and . CoRR, (2020)Fast IR Drop Estimation with Machine Learning., , , , and . CoRR, (2020)Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure., , , and . CoRR, (2021)FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices., , , , , , , and . CoRR, (2022)Analog, In-memory Compute Architectures for Artificial Intelligence., , , , , and . CoRR, (2023)