Personensuche
X
?
The 12th Conference on Information Technology and Its Applications; Lecture Notes in Networks and Systems ,
1
A Model for Alliance Partner Selection Based on GM (1, 1) a..:
, In:
?
2019 22nd Euromicro Conference on Digital System Design (DSD) ,
2
On the Bright Side of Darkness: Side-Channel Based Authenti..:
, In:
?
Proceedings of the 3rd ACM Workshop on Software Protection ,
3
Defeating Opaque Predicates Statically through Machine Lear..:
, In:
?
2019 11th International Conference on Knowledge and Systems Engineering (KSE) ,
4
A Hierarchical Deep Deterministic Policy Gradients for Swar..:
, In:
?
2019 11th International Conference on Knowledge and Systems Engineering (KSE) ,
6
Reinforcement Learning Based Navigation with Semantic Knowl..:
, In:
?
Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop ,
7
DoSE : Deobfuscation based on Semantic Equivalence:
, In:
?
Proceedings of the 2008 ACM symposium on Information, computer and communications security ,
10
An overview of side channel analysis attacks:
, In:
?
2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics ,
11
How can Signal Processing benefit Side Channel Attacks ?:
, In:
?
Proceedings of the 2013 ACM symposium on Document engineering ,
12
Document noise removal using sparse representations over le..:
, In:
?
New Frontiers in Artificial Intelligence; Lecture Notes in Computer Science ,
14