Author of the publication

A High-Speed Two-Cell BCH Decoder for Error Correcting in MLC nor Flash Memories.

, , , , and . IEEE Trans. on Circuits and Systems, 56-II (11): 865-869 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 357-376. IEEE Computer Society, (2016)OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS., , , , and . NDSS, The Internet Society, (2018)Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation., , , , , , , and . NDSS, The Internet Society, (2018)Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps., , , and . USENIX Security Symposium, page 1151-1167. USENIX Association, (2019)WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 255-268. Springer, (2014)Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews., , , , , , , , and . ACM Conference on Computer and Communications Security, page 829-844. ACM, (2017)Nonbinary multi-parallel-concatenated single-parity-check (NB-MPCSPC) codes over partial-response channels., , and . ICICS, page 1-5. IEEE, (2015)Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps., , , , and . NDSS, The Internet Society, (2017)Fast vision-based autonomous detection of moving cooperative target for unmanned aerial vehicle landing., , , , , , , and . J. Field Robotics, 36 (1): 34-48 (2019)Parallel sequential pattern mining by transaction decomposition., , , , and . FSKD, page 1746-1750. IEEE, (2010)