Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101822 (December 2023)The Control Strategy of Unidirectional Current H-Bridge MMC Based Hybrid HVDC System., , , , , and . ISIE, page 2070-2075. IEEE, (2019)Automated Transformation of GPU-Specific OpenCL Kernels Targeting Performance Portability on Multi-Core/Many-Core CPUs., , , , , , , and . Euro-Par, volume 8632 of Lecture Notes in Computer Science, page 210-221. Springer, (2014)A Lightweight Group-Key Management Protocol for Ad Hoc Networks., , , and . ICGEC, page 288-291. IEEE, (2012)Adjacent vertex distinguishing edge colorings of planar graphs with girth at least five., , , and . J. Comb. Optim., 28 (4): 893-909 (2014)Automatic Mapping Single-Device OpenCL Program to Heterogeneous Multi-device Platform., , , , and . HPCC/EUC, page 135-142. IEEE, (2013)Performance analysis of a distributed 6LoWPAN network for the Smart Grid applications., , and . ISSNIP, page 1-6. IEEE, (2014)Observations on the Quantum Circuit of the SBox of AES., , , , and . IACR Cryptology ePrint Archive, (2019)Modeling access control for cyber-physical systems using reputation., , , , and . Comput. Electr. Eng., 38 (5): 1088-1101 (2012)Online Semantic Exploration of Indoor Maps., , and . CoRR, (2020)