Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed-Log-based IP Traceback Scheme to Defeat DDoS Attacks., , , , and . AINA (2), page 25-32. IEEE Computer Society, (2006)MAX2: An ReRAM-Based Neural Network Accelerator That Maximizes Data Reuse and Area Utilization., , , , , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 9 (2): 398-410 (2019)Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks., , , and . Security and Communication Networks, (2018)NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing., , , , and . HOST, page 248-258. IEEE, (2021)Modeling and Control of a Small Mobile Robot with Multi-Locomotion Modes., , , , and . ISDA (2), page 592-597. IEEE Computer Society, (2006)Kinematic Modeling of a Small Mobile Robot with Multi-Locomotion Modes., , , , and . IROS, page 5582-5587. IEEE, (2006)Exploiting Smallest Error to Calibrate Non-Linearity in SAR Adcs., , , , , , , and . IEEE Access, (2018)A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities., , , , and . WAIM, volume 4016 of Lecture Notes in Computer Science, page 205-216. Springer, (2006)Heuristic and Distributed QoS Route Discovery for Mobile Ad hoc Networks., , and . CIT, page 512-516. IEEE Computer Society, (2005)ASCAA: API-level security certification of android applications., , , , and . IET Software, 11 (2): 55-63 (2017)