Author of the publication

Using Complex Network Communities to Evaluate the Correctness of Object Detection.

, , , , and . DSA, page 743-750. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE., , , , and . ACM Conference on Computer and Communications Security, page 1723-1740. ACM, (2019)Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 343-361. Springer, (2014)Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS., , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 110-123. Springer, (2014)A Property-Based Attestation Scheme with the Variable Privacy., , , and . TrustCom, page 1616-1623. IEEE Computer Society, (2011)MicroTEE: Designing TEE OS Based on the Microkernel Architecture., , , , and . TrustCom/BigDataSE, page 26-33. IEEE, (2019)Providing Root of Trust for ARM TrustZone using On-Chip SRAM., , , , and . TrustED@CCS, page 25-36. ACM, (2014)A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0., and . TRUST, volume 9229 of Lecture Notes in Computer Science, page 40-57. Springer, (2015)Design and Implementation of OOM Module based on Rust., , , , and . QRS Companion, page 774-775. IEEE, (2022)Improving the validation of multiple-object detection using a complex-network-community-based relevance metric., , , , and . Knowl. Based Syst., (2024)NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs., , , , , , , , and . CoRR, (2024)