From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asymptotic-Preserving Neural Networks for Multiscale Time-Dependent Linear Transport Equations., , и . J. Sci. Comput., 94 (3): 57 (февраля 2023)Correlation Power Analysis Attack against Synchronous Stream Ciphers., , , и . ICYCS, стр. 2067-2072. IEEE Computer Society, (2008)Color Crafting: Automating the Construction of Designer Quality Color Ramps., , и . IEEE Trans. Vis. Comput. Graph., 26 (1): 1215-1225 (2020)Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective., , , , , и . IEEE Access, (2019)Enhanced correlation power analysis attack against trusted systems., , и . Secur. Commun. Networks, 4 (1): 3-10 (2011)Data, Data, Everywhere: Uncovering Everyday Data Experiences for People with Intellectual and Developmental Disabilities., , , , и . CHI, стр. 804:1-804:17. ACM, (2023)Designing Accessible Visualizations for People with Intellectual and Developmental Disabilities.. CHI Extended Abstracts, стр. 487:1-487:5. ACM, (2023)Simple power analysis attacks using chosen message against ECC hardware implementations., , , , и . WorldCIS, стр. 68-72. IEEE, (2011)Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems., , , , и . ICPADS, стр. 551-555. IEEE Computer Society, (2009)Identification of Abnormal Network Traffic Using Support Vector Machine., , и . PDCAT, стр. 288-292. IEEE Computer Society, (2017)