Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round Witness Hiding Protocol., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (6): 953-960 (2018)Dynamic Simulation of Nanogenerator Based on Finite Element Model Coupled with Lumped Parameter Elements., , , , and . NEMS, page 1291-1294. IEEE, (2021)Research on 3D Fingerprint Positioning Based on MIMO Base Station., , , , , and . CECNet, volume 345 of Frontiers in Artificial Intelligence and Applications, page 621-630. IOS Press, (2021)High-Performance Fingerprint Localization in Massive MIMO System., , , , , and . CECNet, volume 345 of Frontiers in Artificial Intelligence and Applications, page 631-639. IOS Press, (2021)HPC AI500 V2.0: The Methodology, Tools, and Metrics for Benchmarking HPC AI Systems., , , , , , , , and . CLUSTER, page 47-58. IEEE, (2021)EAIBench: An Energy Efficiency Benchmark for AI Training., , , , , , , and . Bench, volume 13852 of Lecture Notes in Computer Science, page 19-34. Springer, (2022)Privacy-Preserving Aggregate Signcryption for Vehicular Ad Hoc Networks., , and . ICCSP, page 72-76. ACM, (2018)Universal Designated Verifier Signcryption., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 126-134. Springer, (2012)Does China's emissions trading system foster corporate green innovation? Evidence from regulating listed companies., , , , and . Technol. Anal. Strateg. Manag., 31 (2): 199-212 (2019)A BLS Signature Scheme from Multilinear Maps., and . Int. J. Netw. Secur., 22 (5): 728-735 (2020)