Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts., , , and . SANER, page 116-126. IEEE, (2020)RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security., , , , , , and . IACR Cryptol. ePrint Arch., (2019)CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception., , , , , and . CoRR, (2023)AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments., , , , , , , and . IV, page 1333-1339. IEEE, (2022)Promote sign consistency in the joint estimation of precision matrices., , and . Comput. Stat. Data Anal., (2021)Structured analysis of the high-dimensional FMR model., , , and . Comput. Stat. Data Anal., (2020)On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles., , , , and . CVPR, page 15138-15147. IEEE, (2022)Jackknife empirical likelihood test for high-dimensional regression coefficients., , , and . Comput. Stat. Data Anal., (2016)$PBT$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 647-662 (2022)Improved model checking methods for parametric models with responses missing at random., , , and . J. Multivar. Anal., (2017)