Author of the publication

A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC.

, , , and . APCCAS, page 162-165. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decrypted data detection algorithm based on dynamic dataflow analysis., , , and . CITS, page 1-4. IEEE, (2014)A Systematic Treat Model for Software-Defined Networking., , , and . KSII Trans. Internet Inf. Syst., 15 (2): 580-599 (2021)ER-Fuzz:Conditional Code Removed Fuzzing., , , and . KSII Trans. Internet Inf. Syst., 13 (7): 3511-3532 (2019)A comprehensive survey of vulnerability detection method towards Linux-based IoT devices., , , and . CNCIT, page 35-41. ACM, (2023)A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC., , , and . APCCAS, page 162-165. IEEE, (2022)DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment., , , , and . ICPADS, page 675-682. IEEE, (2023)SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 762-765. Springer, (2016)Directer: A Parallel and Directed Fuzzing based on Concolic Execution., , and . ICSIE, page 87-92. ACM, (2018)An Improved Offline Symbolic Execution Approach., , and . CSAI/ICIMT, page 314-320. ACM, (2018)Deepbug: Bug Injection in Depth., , , and . EITCE, page 713-718. ACM, (2021)