Author of the publication

Disease Diagnosis Supported by Hierarchical Temporal Memory.

, , , , and . UIC/ATC/ScalCom, page 863-870. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU., , , and . IET Commun., 8 (12): 2142-2146 (2014)Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks., , , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 39-51. Springer, (2013)Further Improvement of Factoring RSA Moduli with Implicit Hint., , , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 165-177. Springer, (2014)Processing Skyline Groups on Data Streams., , , , and . UIC/ATC/ScalCom, page 935-942. IEEE Computer Society, (2015)A matrix construction of Boolean functions with maximum algebraic immunity., and . J. Systems Science & Complexity, 25 (4): 792-801 (2012)Reverse Direction-Based Surrounder Queries., , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 280-291. Springer, (2015)Knowledge Acquisition Approach Based on Incremental Objects From Data With Missing Values., , and . IEEE Access, (2019)Design and Implementation of Privacy-preserving Recommendation System Based on MASK., , , and . J. Softw., 9 (10): 2607-2613 (2014)Predicting protein second structure using a novel hybrid method., , , and . Expert Syst. Appl., 38 (9): 11657-11664 (2011)Partial Key Exposure Attacks on Takagi's Variant of RSA., , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 134-150. Springer, (2014)