Author of the publication

Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM.

, , , , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 284-290. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generic homomorphic MAC construction for authentication in network coding., and . Secur. Commun. Networks, 7 (2): 429-433 (2014)An automated generation tool of hardware masked S-box: AGEMA+., , , , and . IACR Cryptol. ePrint Arch., (2023)Provable Security of SP Networks with Partial Non-Linear Layers., , , , and . IACR Trans. Symmetric Cryptol., 2021 (2): 353-388 (2021)Rethinking Logic Minimization for Tabular Machine Learning., , , and . IEEE Trans. Artif. Intell., 4 (5): 1129-1140 (October 2023)When Do Curricula Work in Federated Learning?, , , , , , , and . ICCV, page 5061-5071. IEEE, (2023)How Fast Can SM4 be in Software?, , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?, , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 851-880. Springer, (2020)Learning Accurate and Interpretable Decision Rule Sets from Neural Networks., , and . AAAI, page 4303-4311. AAAI Press, (2021)Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting., , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 507-520. Springer, (2013)Unsupervised Meta-Learning through Latent-Space Interpolation in Generative Models., , , , , and . ICLR, OpenReview.net, (2021)