Search for persons
X
?
2022 IEEE International Conference on High Voltage Engineering and Applications (ICHVE) ,
1
Artificial Intelligence Aided Design for Film Capacitors:
, In:
?
Proceedings of the 2023 9th International Conference on Communication and Information Processing ,
2
Investigation on Efficient Upload Method for Multi-Satellit..:
, In:
?
2022 Photonics & Electromagnetics Research Symposium (PIERS) ,
3
Cherenkov Radiation Based on Effective Surface Plasmon Pola..:
, In:
?
2020 13th UK-Europe-China Workshop on Millimetre-Waves and Terahertz Technologies (UCMMT) ,
4
Terahertz harmonic gyrotron based on spoof surface plasmon:
, In:
?
2019 PhotonIcs & Electromagnetics Research Symposium - Spring (PIERS-Spring) ,
5
Frequency Selective Rasorber with a Wideband Transmission a..:
, In:
?
2018 11th UK-Europe-China Workshop on Millimeter Waves and Terahertz Technologies (UCMMT) ,
6
Experimental Study of a 330-GHz Pulse Gyrotron with Broadba..:
, In:
?
2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC) ,
7
Discrimination of nuclear explosion and lightning electroma..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
8
BinGo: Identifying Security Patches in Binary Code with Gra..:
, In:
?
Proceedings of the ACM Turing Award Celebration Conference - China 2023 ,
9
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects:
, In:
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
10
Rethinking the Data Annotation Process for Multiview 3D Pos..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
11
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ..:
, In:
?
2023 Power Electronics and Power System Conference (PEPSC) ,
12
Analysis of Transient Overvoltage Impacted by PV Grid-Conne..:
, In:
?
Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses ,
13
BinProv: Binary Code Provenance Identification without Disa..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
14