Author of the publication

A More Effective Way of Target Segmentation of Multispectral Imaging Data Using Kmeans Algorithm.

, , , , , , and . ACIRS, page 82-88. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Screen space anisotropic blurred soft shadows., and . SIGGRAPH Posters, page 75. ACM, (2011)Key Reuse Attack on NewHope Key Exchange Protocol., , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 163-176. Springer, (2018)Identity-Concealed Authenticated Encryption from Ring Learning with Errors., , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)A More Effective Way of Target Segmentation of Multispectral Imaging Data Using Kmeans Algorithm., , , , , , and . ACIRS, page 82-88. IEEE, (2022)Screen Space Anisotropic Blurred Soft Shadows by Efficient Separable Filtering Method., and . CW, page 124-131. IEEE Computer Society, (2013)Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE., , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 56-72. Springer, (2019)Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE., , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 590-609. Springer, (2021)A Fast Phase-based Enumeration Algorithm for SVP Challenge Through y y -Sparse Representations of Short Lattice Vectors., , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 101-113. Springer, (2014)Efficient and Privacy-Preserving Federated Learning based on Full Homomorphic Encryption., , , , , , and . CoRR, (2024)