Search for persons
X
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
1
Stop Stealing My Data: Sanitizing Stego Channels in 3D Prin..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Mirrored Commitment: Fixing "Randomized Partial Checking" a..:
, In:
?
2024 9th International Conference on Big Data Analytics (ICBDA) ,
3
Implementing an Integrated Assistance System for Stock Inve..:
, In:
?
2024 IEEE International Symposium on Circuits and Systems (ISCAS) ,
4
An End-to-End Deep-Learning-Based Indirect Time-of-Flight I..:
, In:
?
Multisector Insights in Healthcare, Social Sciences, Society, and Technology; Advances in Medical Technologies and Clinical Practice ,
5
Incorporating Cultural Context and Academic Perspectives in..:
, In:
?
Governance and Citizenship in Asia; Rights and Urban Controversies in Hong Kong ,
7
Ethics of Urbanism: Rights in Urban Controversies:
, In:
?
2023 IEEE Power & Energy Society General Meeting (PESGM) ,
8
Proactive Grid Planning for Fleet Electrification:
, In:
?
Practice and Experience in Advanced Research Computing 2023: Computing for the Common Good ,
9
Cloud Computing for Research and Education Gets a Sweet Upg..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
10
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All t..:
, In:
?
Governance and Citizenship in Asia; Rights and Urban Controversies in Hong Kong ,
11
Sub-Divided Units: Property Rights and Market Versus Right ..:
, In:
?
2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) ,
12
Predicting Hospital Readmission among Patients with Sepsis ..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
13
Midgame Attacks and Defense Against Them:
, In:
?
Pathogenesis and Treatment of Leukemia ,
14
Molecular Landscape and Personalized Prognostic Prediction ..:
, In:
?
Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science ,
15