Personensuche
X
?
Lecture Notes in Electrical Engineering; Frontier Computing ,
1
An Enhanced Adaptive Neighbourhood Adjustment Strategy on M..:
, In:
?
2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) ,
2
MCFHNet: Multi-Channel Fusion Hybrid Network for Efficient ..:
, In:
?
Proceedings 2001 IEEE International Conference on Cluster Computing ,
3
Cluster and grid superservers: The dawning experiences in C..:
, In:
?
2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA) ,
4
TensorFHE: Achieving Practical Computation on Encrypted Dat..:
, In:
?
2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) ,
5
fuzzyForward: A Novel Multi-hop Data Forwarding Scheme Usin..:
, In:
?
2022 IEEE 40th International Conference on Computer Design (ICCD) ,
6
In-depth Testing of x86 Instruction Disassemblers with Feed..:
, In:
?
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) ,
7
fuzzyCom: Privacy-Aware Trajectory Data Compression Using F..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
8
DEPCOMM: Graph Summarization on System Audit Logs for Attac..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
9
A novel network traffic classification approach via discrim..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
Prototype-Based Malware Traffic Classification with Novelty..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
11
Zipper Stack: Shadow Stacks Without Shadow:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12
An Approach for Poisoning Attacks Against RNN-Based Cyber A..:
, In:
?
2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom) ,
13
MMNR: A Network Representation Framework Based on Multi-Vie..:
, In:
?
Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors ,
14
Role-based Log Analysis Applying Deep Learning for Insider ..:
, In:
?
Proceedings of the 12th ACM International Conference on Computing Frontiers ,
15