Author of the publication

A course-based undergraduate research experience project in information security.

, , , , and . ACM Southeast Regional Conference, page 206-210. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking the Dialogue System at Smart Home., , , , and . CollaborateCom (1), volume 349 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 148-158. Springer, (2020)Traitor Tracing and Revocation Mechanisms with Privacy-Preserving., and . CIS, page 842-846. IEEE Computer Society, (2011)Motor-Controlled Spindle (MCS) Detection for Primate in BCI System., , , and . NER, page 433-436. IEEE, (2019)mHapTk: a comprehensive toolkit for the analysis of DNA methylation haplotypes., , , , , and . Bioinform., 38 (22): 5141-5143 (November 2022)Online Parameterization of Lumped Thermal Dynamics in Cylindrical Lithium Ion Batteries for Core Temperature Estimation and Health Monitoring., , , , , , , and . IEEE Trans. Control. Syst. Technol., 21 (5): 1745-1755 (2013)Reliability Analysis of Dynamic Load-Sharing Systems With Constrained and Changing Component Performances., , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (9): 5897-5909 (September 2023)LGGNet: Learning from Local-Global-Graph Representations for Brain-Computer Interface., , , and . CoRR, (2021)Channel Pruning Guided by Spatial and Channel Attention for DNNs in Intelligent Edge Computing., , , , , and . CoRR, (2020)Verification of concurrent code from synchronous specifications., , , , and . Sci. Comput. Program., (2021)A social commerce purchasing decision model with trust network and item review information., , , , and . Knowl. Based Syst., (2022)