Author of the publication

A robust low-overhead watermarking for field authentication of intellectual property cores.

, , , , and . Comput. Sci. Inf. Syst., 13 (2): 609-622 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust low-overhead watermarking for field authentication of intellectual property cores., , , , and . Comput. Sci. Inf. Syst., 13 (2): 609-622 (2016)An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters., and . J. Softw., 8 (8): 2080-2086 (2013)A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search., , , and . TrustCom/BigDataSE/ISPA (1), page 1298-1305. IEEE, (2015)Automatic Chinese Personality Recognition Based on Prosodic Features., , , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 180-190. Springer, (2015)A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value., , , and . J. Sensors, (2015)Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model., , , , and . ICIOT, page 97-104. IEEE Computer Society, (2017)A Detection and Classification Method of Asphalt Pavement Crack based on Vision Transformer., , , and . ICBAR, page 1125-1131. ACM, (2023)Sparse Code Multiple Access with Index Modulation., and . ICCC, page 1314-1318. IEEE, (2020)Research of Cesium Adsorption on Mo and Ni Based on Temperature-Controlled Quartz Microbalance., , , , , and . IEEE Trans. Instrum. Meas., (2024)Det2Seg: A Two-Stage Approach for Road Object Segmentation from 3D Point Clouds., , , , and . VCIP, page 1-4. IEEE, (2019)