Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101822 (December 2023)Exploring Hypergraph Representation on Face Anti-spoofing Beyond 2D Attacks., , , , and . CoRR, (2018)An interference mitigation approach for a dense heterogeneous wireless sensor network., , and . ICSPCS, page 1-7. IEEE, (2015)Reference-frame-independent measurement-device-independent quantum key distribution using hybrid logical basis., , , , and . Quantum Inf. Process., 17 (10): 256 (2018)A Speech-to-Knowledge-Graph Construction System., , , , , , and . IJCAI, page 5303-5305. ijcai.org, (2020)Demo.Automatic Damage Detection on Rooftop Solar Photovoltaic Arrays., , and . BuildSys@SenSys, page 332-333. ACM, (2020)A quality evaluation method for intelligent traffic management system based on business data flow., , and . J. Intell. Fuzzy Syst., 45 (4): 6193-6208 (October 2023)Integrated Node Infrastructure for Future Smart City Sensing and Response., , , and . Remote. Sens., 15 (14): 3699 (July 2023)Data Movement Accelerator Engines on a Prototype Power10 Processor., , , , , , , , , and . IEEE Micro, 43 (1): 67-75 (2023)A Novel Dual-Band Printed Monopole Antenna With Modified SIR Loading., , , , and . IEEE Access, (2024)