Author of the publication

Design and Analysis of Low-Voltage Low-Parasitic ESD Protection for RF ICs in CMOS.

, , , , , , , , , , and . J. Solid-State Circuits, 46 (5): 1100-1110 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breather-to-soliton conversions and nonlinear wave interactions in a coupled Hirota system., , and . Appl. Math. Lett., (2016)A 0.2 V-1.8 V 8T SRAM with Bit-interleaving Capability., , , , and . IEICE Electronic Express, (2014)A novel nature-inspired algorithm for optimization: Virus colony search., , , and . Advances in Engineering Software, (2016)Generalized prolate spheroidal wave functions associated with linear canonical transform., , , and . IEEE Trans. Signal Processing, 58 (6): 3032-3041 (2010)Secrecy Analysis in SWIPT Systems Over Generalized- $K$ Fading Channels., , , , and . IEEE Communications Letters, 23 (5): 834-837 (2019)Exploration on Routing Configuration of HNoC with Reasonable Energy Consumption., , , and . ISVLSI, page 744-749. IEEE Computer Society, (2018)Active User Detection of Uplink Grant-Free SCMA in Frequency Selective Channel., , , , and . VTC Spring, page 1-6. IEEE, (2018)An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets., , , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 601-611. Springer, (2018)Fault Forecast of Electronic Equipment Based on ε -SVR., , and . WISM, volume 7529 of Lecture Notes in Computer Science, page 521-527. Springer, (2012)Construction of bound entangled states based on permutation operators., , , and . Quantum Information Processing, 15 (4): 1529-1538 (2016)