Author of the publication

Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks.

, , , , , , , , and . ACM Trans. Embed. Comput. Syst., 22 (5s): 103:1-103:22 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selective Knowledge Sharing for Personalized Federated Learning Under Capacity Heterogeneity., , , , and . CoRR, (2024)Research on Intelligent Distribution Control and Automation System., , , , , , and . IC-AI, page 101-105. CSREA Press, (2008)Flow identification for supporting per-flow queueing., and . ICCCN, page 88-93. IEEE, (2000)Efficient Active Learning with Boosting., , and . SDM, page 1232-1243. SIAM, (2009)Design of a CAI System for Translation Teaching. Advanced Research on Computer Education, Simulation and Modeling, Springer Berlin Heidelberg, Berlin, Heidelberg, (2011)Resequencing 302 wild and cultivated accessions identifies genes related to domestication and improvement in soybean, , , , , , , , , and 18 other author(s). Nat Biotech, 33 (4): 408--414 (April 2015)A Rate Allocation Scheme for Multi-User over Heterogeneous Wireless Access Networks., , , and . VTC Fall, page 1-5. IEEE, (2010)The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception., , and . MobiHoc, page 179-188. ACM, (2008)Accelerator Design for Convolutional Neural Network with Vertical Data Streaming., , and . APCCAS, page 544-547. IEEE, (2018)Matsya: A Cultural Game of Flow and Balance., , , , , , , , and . CHI PLAY, page 751-754. ACM, (2015)