Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation on Power Analysis Attacks for Unbalanced Data., , , , , and . Secur. Commun. Networks, (2020)Research on the Grouping Method of Side-Channel Leakage Detection., , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 807-818. Springer, (2022)An interpretable MRI reconstruction network with two-grid-cycle correction and geometric prior distillation., , , , and . Biomed. Signal Process. Control., (July 2023)Nest-DGIL: Nesterov-optimized Deep Geometric Incremental Learning for CS Image Reconstruction., , , , and . CoRR, (2023)Deep Geometric Distillation Network for Compressive Sensing MRI., , and . BHI, page 1-4. IEEE, (2021)The research on security SDN south interface based on OTR protocol., , , and . ISCIT, page 629-633. IEEE, (2016)Design and Implementation of OpenStack Cloud Platform Identity Management Scheme., , , and . CITS, page 1-5. IEEE, (2018)PRISTA-Net: Deep Iterative Shrinkage Thresholding Network for Coded Diffraction Patterns Phase Retrieval., , , and . CoRR, (2023)A Multi-scale Generalized Shrinkage Threshold Network for Image Blind Deblurring in Remote Sensing., , , , and . CoRR, (2023)A Method Based on Genetic Algorithm for Anti-ship Missile Path Planning., and . CSO (2), page 156-159. IEEE Computer Society, (2009)978-0-7695-3605-7.