Author of the publication

Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption.

, , , and . J. Comput. Sci. Technol., 36 (5): 1102-1117 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph-augmented Convolutional Networks on Drug-Drug Interactions Prediction., , , , , and . CoRR, (2019)Improved Detection of User Malicious Behavior through Log Mining based on IHMM., , and . ICSAI, page 1193-1198. IEEE, (2018)A New Small-World IoT Routing Mechanism based on Cayley Graphs., , , , and . CoRR, (2019)An Efficient Spiking Neural Network Accelerator with Sparse Weight., , , , and . BioCAS, page 1-5. IEEE, (2023)Real-Time Sensing and Communication Improvement with Mobile Sensors., , and . ICCC Workshops, page 71-76. IEEE, (2021)Device-free Location-independent Human Activity Recognition via Few-shot Learning., , , , , and . ICCC Workshops, page 106-111. IEEE, (2021)A Lightweight Mobile Temporal Convolution Network for Multi-Location Human Activity Recognition based on Wi-Fi., , , , , and . ICCC Workshops, page 143-148. IEEE, (2021)Incorporating Android Code Smells into Java Static Code Metrics for Security Risk Prediction of Android Applications., , , , and . QRS, page 30-40. IEEE, (2020)Analysis and Optimization of Local Delay for Cache-Enabled Networks with Random DTX., , , and . ICC, page 1-6. IEEE, (2021)On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination., , , and . SECON, page 82-90. IEEE, (2022)