Author of the publication

Experimental and computational investigation of heteroatom substitution in nucleolytic Cu(ii) cyclen complexes for balancing stability and redox activity

, , , , , , , and . Dalton transactions, 52 (10): 3176-3187 (2023)
DOI: 10.1039/d2dt03284h

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Approach to Detect Memory Leaks in JavaScript (S)., , and . SEKE, page 582-581. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2018)Inferring weak references for fixing Java memory leaks., and . ICSM, page 571-574. IEEE Computer Society, (2012)Joint Adaptive Coding and Reversible Data Hiding for AMBTC Compressed Images., , and . Symmetry, 10 (7): 254 (2018)NeLSTM: A New Model for Temporal Link Prediction in Social Networks., , , and . ICSC, page 183-186. IEEE, (2019)Topic Model Based Text Similarity Measure for Chinese Judgment Document., , , , , , , and . ICPCSEE (2), volume 728 of Communications in Computer and Information Science, page 42-54. Springer, (2017)Are Anti-patterns Coupled? An Empirical Study., , , , and . QRS, page 242-251. IEEE, (2015)A New Approach of Partial Order Reduction Technique for Parallel Timed Automata Model Checking., , and . SERE (Companion), page 158-167. IEEE, (2012)On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism., , and . I. J. Network Security, 21 (2): 230-235 (2019)An FPGA-based Time Sampling Charge Measurement Method for TOF-PET Detectors., , , , , and . I2MTC, page 1-5. IEEE, (2019)Information Extraction from Chinese Judgment Documents., , , , , , and . WISA, page 240-244. IEEE, (2017)