Search for persons
X
?
2022 22nd International Conference on Control, Automation and Systems (ICCAS) ,
1
Implementation of 100CMM Thermal Storage Combustion Oxidize..:
, In:
?
Proceedings of the 4th International Conference on Communication and Information Processing ,
2
Per-bank refresh with adaptive early termination for high d..:
, In:
?
2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) ,
3
Side-Channel Based Device Authentication in Wireless Chargi..:
, In:
?
2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) ,
4
I Know Where You Are: A Non-intrusive Geospatial–Electrical..:
, In:
?
2023 IEEE Sixth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) ,
5
CO-TRIS: Container Orchestration – Transforming container u..:
, In:
?
2022 22nd International Conference on Control, Automation and Systems (ICCAS) ,
6
Analysis of Electrode Configuration of Underwater Electric ..:
, In:
?
2022 19th International Conference on Ubiquitous Robots (UR) ,
7
Axis Calibration Method of Underwater Electric Field Measur..:
, In:
?
Proceedings of the 2020 5th International Conference on Intelligent Information Technology ,
8
TargetNet Backdoor : Attack on Deep Neural Network with ..:
, In:
?
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications ,
9
CERT Training Platform over the Event-Recordable Container:
, In:
?
Communications in Computer and Information Science; Mobile Internet Security ,
10
Reduction of Data Leakage Using Software Streaming:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
11
Toward a Fine-Grained Evaluation of the Pwnable CTF:
, In:
?
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications ,
12
Toward Software-Defined Moving Target Defense for Secure Se..:
, In:
?
Proceedings of the 3rd International Conference on Software Engineering and Information Management ,
13
FriendNet Backdoor : Indentifying Backdoor Attack that i..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
14
CAPTCHA Image Generation Using Style Transfer Learning in D..:
, In:
?
Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications ,
15