Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and signal integrity analysis of silicon interposer channels based on MTL and KBNN., , , , , , , , , and . Microelectron. J., (2024)A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues., , , , , and . Ad Hoc Sens. Wirel. Networks, 44 (1-2): 109-130 (2019)SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge., , , , , and . TrustCom, page 450-457. IEEE, (2020)Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven., , , , and . ICIRA (1), volume 8917 of Lecture Notes in Computer Science, page 179-186. Springer, (2014)Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using UAV Imagery., , , , , , , and . Sensors, 18 (10): 3299 (2018)Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media., , , , , and . IEEE Access, (2019)Addictive Incentive Mechanism in Crowdsensing From the Perspective of Behavioral Economics., , , , and . IEEE Trans. Parallel Distributed Syst., 33 (5): 1109-1127 (2022)Traceable Identity-Based Group Signature., , , and . RAIRO Theor. Informatics Appl., 50 (3): 193-226 (2016)Software Vulnerability Detection Using Deep Neural Networks: A Survey., , , , and . Proc. IEEE, 108 (10): 1825-1848 (2020)Bug Searching in Smart Contract., , , and . CoRR, (2019)