Search for persons
X
?
Lecture Notes in Electrical Engineering; Proceedings of 2023 7th Chinese Conference on Swarm Intelligence and Cooperative Control ,
1
Observer-Based Positive Edge Consensus of Multi-agent Syste..:
, In:
?
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning ,
2
Optimisation Strategies for Load Balancing Algorithms Based..:
, In:
?
2023 5th International Conference on Robotics and Computer Vision (ICRCV) ,
3
A Fuzzy Fusion Approach for the Prediction of Position and ..:
, In:
?
Lecture Notes in Electrical Engineering; Proceedings of China SAE Congress 2022: Selected Papers ,
4
Research on the Technology of Accurate Measurement for the ..:
, In:
?
Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science ,
5
Grover on SM3:
, In:
?
Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval ,
6
Automatic Expert Selection for Multi-Scenario and Multi-Tas..:
, In:
?
2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE) ,
7
Emergency Rescue Action Recognition Algorithm Based on Recu..:
, In:
?
2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture ,
8
Research on the Middle Platform Service System of Battlefie..:
, In:
?
Mobile Multimedia Communications; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ,
9
Real-Time Stream Statistics via Local Differential Privacy ..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
10
Isogeny Computation on Twisted Jacobi Intersections:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
11
Impact of Optimized Operations $$A\cdot B$$, $$A\cdot C$$ f..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
12
Parallel Implementation of SM2 Elliptic Curve Cryptography ..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
13
Optimized Arithmetic Operations for Isogeny-Based Cryptogra..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018 ,
14
Compact Implementation of Modular Multiplication for Specia..:
, In:
?
2019 WRC Symposium on Advanced Robotics and Automation (WRC SARA) ,
15