Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Orientation Mining-Driven Approach to Analyze Web Public Sentiment., , , , and . JSW, 6 (8): 1417-1428 (2011)SDViNet: A software defined virtual network management platform in IaaS cloud., , , , , , , and . LANMAN, page 1-6. IEEE, (2014)A Quantification Method of Qualitative Indices Based on Inverse Conversion Degree Functions., and . ES, page 261-264. IEEE, (2014)Virtual Proofs of Reality and their Physical Implementation., , , , , , , and . IEEE Symposium on Security and Privacy, page 70-85. IEEE Computer Society, (2015)Surviving in the dispute: A bibliometric analysis of global GMF-related research, 1995-2014., , , , , and . Scientometrics, 109 (1): 359-375 (2016)Reliable PUF design using failure patterns from time-controlled power gating., and . DFT, page 135-140. IEEE Computer Society, (2016)An agent-based model to study the market dynamics of perpetual and subscription licensing., , , and . JORS, 66 (5): 845-857 (2015)Development and Evaluation of Hardware Obfuscation Benchmarks., , , , , , and . J. Hardware and Systems Security, 2 (2): 142-161 (2018)SCARe: An SRAM-Based Countermeasure Against IC Recycling., , , , and . IEEE Trans. VLSI Syst., 26 (4): 744-755 (2018)ACStor: Optimizing Access Performance of Virtual Disk Images in Clouds., , , , , , , and . IEEE Trans. Parallel Distrib. Syst., 28 (9): 2414-2427 (2017)