Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures., , , , , , and . CODASPY, page 89-100. ACM, (2021)Application Value of Artificial Intelligence System in Music Education.. ICISCAE (ACM), page 1459-1462. ACM, (2021)Enterprise Accounting and Financial Risk Analysis System Based on Decision Tree and SVM., , and . ICISCAE (ACM), page 2015-2018. ACM, (2021)Lower bound on the ergodic capacity of distributed MIMO systems over K fading channels., , , and . ICCC, page 1-6. IEEE, (2016)Design and Characterization of Arbitrary Filters with an Integrated Spiral Si3N4/SiO2 Waveguide., , , , , and . OFC, page 1-3. IEEE, (2020)Building Extraction Using Mask Scoring R-CNN Network., and . CSAE, page 113:1-113:5. ACM, (2019)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , and . IJCNN, page 1-10. IEEE, (2023)Toward Clinically Assisted Colorectal Polyp Recognition via Structured Cross-Modal Representation Consistency., , , , , , and . MICCAI (3), volume 13433 of Lecture Notes in Computer Science, page 141-150. Springer, (2022)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , and . MobiCom, page 513-527. ACM, (2024)WeakPolyp: You only Look Bounding Box for Polyp Segmentation., , , , and . MICCAI (3), volume 14222 of Lecture Notes in Computer Science, page 757-766. Springer, (2023)