Search for persons
X
?
Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science ,
1
PIPO: A Lightweight Block Cipher with Efficient Higher-Orde..:
, In:
?
Proceedings of the eighth international conference on Information and knowledge management ,
2
Spatial match representation scheme supporting ranking in i..:
, In:
?
Nutraceutical and Functional Food Regulations in the United States and around the World ,
3
List of contributors:
, In:
?
2020 20th International Conference on Control, Automation and Systems (ICCAS) ,
5
Tendon-Driven Continuum Robot Systems with only A Single Mo..:
, In:
?
Proceedings of the 3rd International Conference on Human-Agent Interaction ,
7
A Preliminary Study on Human Trust Measurements by EEG for ..:
, In:
?
2017 IEEE International Electron Devices Meeting (IEDM) ,
8
Breakthrough of selector technology for cross-point 25-nm R..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
10
Vulnerability Assessment Framework Based on In-The-Wild Exp..:
, In:
?
2024 IEEE International Conference on Big Data and Smart Computing (BigComp) ,
11
An Emotion Analysis Method Building Love Emotion Emoji Dict..:
, In:
?
2023 11th International Conference on Power Electronics and ECCE Asia (ICPE 2023 - ECCE Asia) ,
12
Cost-Effective System Installed in Light Electric Vehicles ..:
, In:
?
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications ,
13
SplitGP: Achieving Both Generalization and Personalization ..:
, In:
?
2023 7th Cyber Security in Networking Conference (CSNet) ,
14
Vulnerability Assessment Based on Real World Exploitability..:
, In:
?
2023 IEEE International Solid- State Circuits Conference (ISSCC) ,
15