Author of the publication

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.

, , , and . ICC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-approximation adaptive fault-tolerant control for nonlinear pure-feedback systems with unknown control directions and sensor failures., , , and . Fuzzy Sets Syst., (2019)Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 66-II (6): 1058-1062 (2019)Intelligent optical computation for online optical signal processing., and . Sarnoff Symposium, page 1-3. IEEE, (2019)Development and Test of Manhole Cover Monitoring Device Using LoRa and Accelerometer., , and . IEEE Trans. Instrumentation and Measurement, 69 (5): 2570-2580 (2020)Specific, Non-Invasive, and Magnetically Directed Targeting of Magnetic Erythrocytes in Blood Vessels of Mice., , , , , , , , , and . IEEE Trans. Biomed. Eng., 67 (8): 2276-2285 (2020)DuReader: a Chinese Machine Reading Comprehension Dataset from Real-world Applications, , , , , , , , , and 3 other author(s). (2017)cite arxiv:1711.05073Comment: 10 pages, ACL 2018 MRQA Workshop camera-ready version.Combination Attacks and Defenses on SDN Topology Discovery., , , , , , , , and . IEEE/ACM Trans. Netw., 31 (2): 904-919 (April 2023)Behavioral Modeling of Direct-Conversion Receivers for Nonlinear Distortion Mitigation., , , , and . IEEE Access, (2024)Coordinated False Data Injection Attacks in AGC System and Its Countermeasure., , and . IEEE Access, (2020)SGNNMD: signed graph neural network for predicting deregulation types of miRNA-disease associations., , , , , and . Briefings Bioinform., (2022)