Search for persons
X
?
Selected Areas in Cryptography – SAC 2023; Lecture Notes in Computer Science ,
1
Improving the Rectangle Attack on GIFT-64:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
2
Improved Related-Key Rectangle Attack Against the Full AES-..:
, In:
?
Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology ,
3
A Robust Gray-code Pattern Decoding Method for 3D Scanning ..:
, In:
?
Proceedings of the 2023 12th International Conference on Networks, Communication and Computing ,
4
Offline Signature Verification Using a 2D Attention Encoder..:
, In:
?
2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT) ,
5
Research and Implementation of Road Damage Detection Algori..:
, In:
?
2022 the 5th International Conference on Image and Graphics Processing (ICIGP) ,
6
Research on Handwritten Digital Image Recognition Model Bas..:
, In:
?
2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC) ,
7
End-to-End Chinese Lip-Reading Recognition Based on Multi-m..:
, In:
?
Proceedings of the 59th ACM/IEEE Design Automation Conference ,
8
ReSMA : accelerating approximate string matching using R..:
, In:
?
2020 5th Asia Conference on Power and Electrical Engineering (ACPEE) ,
9
Fiber Channel Fault Location of Measurement and Protection ..:
, In:
?
2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) ,
10
Analysis and Treatment of Three-Phase Unbalance Problem:
, In:
?
Proceedings of the 3rd International Conference on Computer Science and Application Engineering ,
11