Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Pipeline Optimization Model for QKD Post-processing System., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 472-481. Springer, (2014)EERA-KWS: A 163 TOPS/W Always-on Keyword Spotting Accelerator in 28nm CMOS Using Binary Weight Network and Precision Self-Adaptive Approximate Computing., , , , , , , , , and . IEEE Access, (2019)A Real-Time Privacy Amplification Scheme in Quantum Key Distribution., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. UCS, 19 (16): 2420-2436 (2013)A new method of minimum convex hull in computer applications., and . IJCAT, 50 (3/4): 206-209 (2014)A multi-scale triangular mapping and its applications in variation scale scrambling., , , , and . IJCAT, 38 (1/2/3): 74-85 (2010)A new method to locate high resolution satellite imagery without ground control points based on prediction., , , , and . IGARSS, page 3. IEEE, (2005)Filtering Spam in Social Tagging System with Dynamic Behavior Analysis., , , , and . ASONAM, page 95-100. IEEE Computer Society, (2009)Ship movement anomaly detection using specialized distance measures., , , and . FUSION, page 1113-1120. IEEE, (2015)