Search for persons
X
?
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD) ,
1
ULTRA: Exploring Team Recommendations in Two Geographies Us..:
, In:
?
Progress in Cryptology - AFRICACRYPT 2024; Lecture Notes in Computer Science ,
2
DiTRU: A Resurrection of NTRU over Dihedral Group:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
3
Results on the Key Space of Group-Ring NTRU: The Case of th..:
, In:
?
Communications in Computer and Information Science; Intelligent Systems and Pattern Recognition ,
4
Study of Support Set Generation Techniques in LAD for Intru..:
, In:
?
2023 IEEE 23rd International Conference on Nanotechnology (NANO) ,
5
Randomness Enhancement in a Quantum Dot-Based Quantum Rando..:
, In:
?
Codes, Cryptology and Information Security; Lecture Notes in Computer Science ,
7
Computational Results on Gowers $$U_2$$ and $$U_3$$ Norms o..:
, In:
?
Intelligent Data Engineering and Automated Learning – IDEAL 2023; Lecture Notes in Computer Science ,
9
Generating Adversarial Examples Using LAD:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
11
Design of Intrusion Detection System Based on Logical Analy..:
, In:
?
Intelligent Data Engineering and Automated Learning – IDEAL 2022; Lecture Notes in Computer Science ,
12
A Comparative Study of LAD, CNN and DNN for Detecting Intru..:
, In:
?
Advances in Intelligent Systems and Computing; Progress in Advanced Computing and Intelligent Engineering ,
14