Author of the publication

Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks.

, , , and . SIAM J. Numer. Anal., 62 (2): 593-621 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Remarks on a Convertible Nominative Signature Scheme., and . SEC, volume 232 of IFIP, page 265-275. Springer, (2007)Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce., and . ICC, page 1503-1508. IEEE, (2007)Collusion attack on a multi-key secure video proxy scheme., and . ACM Multimedia, page 380-383. ACM, (2004)Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity., and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 52-61. Springer, (2010)Correction, Optimisation and Secure and Efficient Application of PBD Shuffling., and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 425-437. Springer, (2008)Broadcasting in Star Graphs with Byzantine Failures., , , and . ASIAN, volume 1179 of Lecture Notes in Computer Science, page 162-171. Springer, (1996)Security analysis on a conference scheme for mobile communications., , , and . IEEE Trans. Wirel. Commun., 5 (6): 1238-1240 (2006)Access control protocols with two-layer architecture for wireless networks., , , and . Comput. Networks, 51 (3): 655-670 (2007)Highly reliable trust establishment scheme in ad hoc networks., , , , , and . Comput. Networks, 45 (6): 687-699 (2004)Cryptanalysis and improvement on batch verifying multiple RSA digital signatures., , and . Appl. Math. Comput., 172 (2): 1195-1200 (2006)