Search for persons
X
?
Information Security Applications; Lecture Notes in Computer Science ,
1
OCR Meets the Dark Web: Identifying the Content Type Regard..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
2
AE-LSTM Based Anomaly Detection System for Communication Ov..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
3
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synth..:
, In:
?
2022 IEEE International Conference on Consumer Electronics (ICCE) ,
4
AVS3 Decoder Architecture and VLSI Implementation for 8K UH..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
5
A New Password Cracking Model with Generative Adversarial N..:
, In:
?
2024 IEEE International Reliability Physics Symposium (IRPS) ,
6
A Systematic Study of HCI Improvement in FinFET with Source..:
, In:
?
2022 IEEE International Conference on Big Data (Big Data) ,
7
How Do You Watch Music Video: "Watching or Listening?":
, In:
?
2022 IEEE International Conference on Big Data (Big Data) ,
8
Visual Attributes of Thumbnails in Predicting Top YouTube B..:
, In:
?
Proceedings of the 9th Augmented Human International Conference ,
9
VR Planning Toolkit to Simulate Physical and Virtual Config..:
, In:
?
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems ,
10