Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Mobile Application Over Shadowsocks with Single-Direction Traffic., , , , and . DSC, page 551-558. IEEE, (2023)Bayesian theory oriented Optimal Data-Provider Selection for CMP., , , , and . ICCD, page 249-256. IEEE Computer Society, (2013)Wear-Resistant Hybrid Cache Architecture with Phase Change Memory., , , , and . NAS, page 268-272. IEEE Computer Society, (2012)FedValidate: A Robust Federated Learning Framework Based on Client-Side Validation., , , , , and . DSC, page 337-344. IEEE, (2023)Content-aware write reduction mechanism of phase-change RAM based Frame Store in H.264 Video codec system., , , and . ISCAS, page 273-276. IEEE, (2013)Cluster Cache Monitor., , , , and . SBAC-PAD, page 1-8. IEEE Computer Society, (2013)Improving Knowledge Distillation for Federated Learning on Non-IID Data., , , , and . IEEE Big Data, page 598-607. IEEE, (2023)Abusive Language Detection with Graph based Multi-task Learning., , , , , , , and . IEEE Big Data, page 675-684. IEEE, (2022)Binary classification based linear rate estimation model for HEVC RDO., , and . ICIP, page 3676-3680. IEEE, (2014)Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall., , , , , and . DSC, page 526-531. IEEE Computer Society, (2016)