|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 61 occurrences of 39 keywords
|
|
|
Results
Found 1124 publication records. Showing 1056 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
227 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
164 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
114 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
109 | Hirotaka Yoshida, Alex Biryukov |
Analysis of a SHA-256 Variant. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256 |
96 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
91 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
A new hash family obtained by modifying the SHA-2 family. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, cryptanalysis |
62 | Nicolas Sklavos 0001, Odysseas G. Koufopavlou |
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. |
ISCAS (5) |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
Improving SHA-2 Hardware Implementations. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
SHA-2 (256, 512), FPGA, Cryptography, Hash functions |
57 | Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
Cost-Efficient SHA Hardware Accelerators. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Local Collisions for the SHA-2 Hash Family. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Zeyad A. Al-Odat, Assad Abbas, Samee U. Khan |
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. |
FIT |
2019 |
DBLP DOI BibTeX RDF |
|
49 | Helena Handschuh |
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
49 | Vlastimil Klíma, Danilo Gligoroski |
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
34 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
34 | William E. Burr |
A New Hash Competition. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
A compact FPGA implementation of the hash function whirlpool. |
FPGA |
2006 |
DBLP DOI BibTeX RDF |
compact hardware implementation, FPGA, hash function, whirlpool |
34 | Marco Macchetti, Luigi Dadda |
Quasi-Pipelined Hash Circuits. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo |
Quantum Implementation and Analysis of SHA-2 and SHA-3. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
33 | Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi |
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck |
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
33 | Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck |
Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. |
SAC |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Yusuke Naito 0001, Lei Wang 0031 |
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. |
CT-RSA |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. |
ICETE (Selected Papers) |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Pal-Stefan Murvay, Bogdan Groza |
Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. |
Int. J. Secur. Softw. Eng. |
2013 |
DBLP DOI BibTeX RDF |
|
33 | George Athanasiou, George Theodoridis, Costas E. Goutis, Harris E. Michail, Takis Kasparis |
A Systematic Flow for Developing Totally Self-Checking Architectures for SHA-1 and SHA-2 Cryptographic Hash Families. |
J. Circuits Syst. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
33 | James Docherty, Albert Koelmans |
A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions. |
ISCAS |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane |
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Marcio Juliato, Catherine H. Gebotys |
Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. |
ReConFig |
2009 |
DBLP DOI BibTeX RDF |
Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction |
16 | Yingxin Li, Fukang Liu, Gaoli Wang |
New Records in Collision Attacks on SHA-2. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
16 | Yingxin Li, Fukang Liu, Gaoli Wang |
New Records in Collision Attacks on SHA-2. |
EUROCRYPT (1) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer |
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Asimina Koutra, Vasileios Tenentes |
High Throughput and Energy Efficient SHA-2 ASIC Design for Continuous Integrity Checking Applications. |
ETS |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Lukas Vlasak, Antoine Bouvet, Sylvain Guilley |
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. |
INDOCRYPT (1) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hoai Luan Pham, Thi Hong Tran, Vu Trung Duong Le, Yasuhiko Nakashima |
A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
16 | L. Shane John Paul, Carlton Gracias, Anurag Desai, V. Thanikaiselvan, S. Suba Shanthini, Amirtharajan Rengarajan |
A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2. |
Multim. Tools Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Hoai Luan Pham, Thi Hong Tran, Vu Trung Duong Le, Yasuhiko Nakashima |
A Coarse Grained Reconfigurable Architecture for SHA-2 Acceleration. |
IPDPS Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong |
A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2. |
ICDSP |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Yin Zhang, Zhangqing He, Meilin Wan, Muwen Zhan, Ming Zhang, Kuang Peng, Min Song, Haoshuang Gu |
A New Message Expansion Structure for Full Pipeline SHA-2. |
IEEE Trans. Circuits Syst. I Regul. Pap. |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer |
First Full-Fledged Side Channel Attack on HMAC-SHA-2. |
COSADE |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Debjyoti Bhattacharjee, Anirban Majumder, Anupam Chattopadhyay |
In-memory realization of SHA-2 using ReVAMP architecture. |
VLSID |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Raffaele Martino, Alessandro Cilardo |
SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Simo Sorce, Hubert Kario |
Generic Security Service Application Program Interface (GSS-API) Key Exchange with SHA-2. |
RFC |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Raffaele Martino, Alessandro Cilardo |
A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Amnah Firdous, Aqeel-ur Rehman, Malik Muhammad Saad Missen |
A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. |
Multim. Tools Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Aqeel-ur Rehman, Xiaofeng Liao 0001 |
A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. |
Multim. Tools Appl. |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Panjin Kim, Daewan Han, Kyung Chul Jeong |
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2. |
Quantum Inf. Process. |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Harsimranjit Singh Gill, Sandeep Singh Gill, Kamaljit Singh Bhatia |
A Novel Chaos-Based Encryption Approach for Future-Generation Passive Optical Networks Using SHA-2. |
JOCN |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3. |
RFC |
2016 |
DBLP DOI BibTeX RDF |
|
16 | Johannes Merkle, Manfred Lochter |
HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3. |
RFC |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Mohamed Anane, Nadjia Anane |
SHA-2 hardware core for virtex-5 FPGA. |
SSD |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Marcio Juliato, Catherine H. Gebotys |
A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. |
IEEE Trans. Aerosp. Electron. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Pawel Swierczynski, Gregor Leander, Christof Paar |
Keccak und der SHA-2. |
Datenschutz und Datensicherheit |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. |
SECRYPT |
2013 |
DBLP BibTeX RDF |
|
16 | Denis Bider, Mark D. Baushke |
SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. |
RFC |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Ji Li, Takanori Isobe 0001, Kyoji Shibutani |
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva |
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva |
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
16 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
Novel Hardware Architecture for Implementing the Inner Loop of the SHA-2 Algorithms. |
DSD |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
16 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
A combinatorial analysis of recent attacks on step reduced SHA-2 family. |
Cryptogr. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jelte Jansen |
Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. |
RFC |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jian Guo 0001, Krystian Matusiewicz |
Preimages for Step-Reduced SHA-2. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
16 | Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
Cryptanalysis of Dynamic SHA(2). |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
16 | Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
Cryptanalysis of Dynamic SHA(2). |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate |
16 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
22-Step Collisions for SHA-2 |
CoRR |
2008 |
DBLP BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
A New Hash Family Obtained by Modifying the SHA-2 Family. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision attacks Against Up To 24-step SHA-2. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-Linear Reduced Round Attacks Against SHA-2 Hash family. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | ZiJie Xu |
Dynamic SHA-2. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | Vlastimil Klíma |
On Collisions of Hash Functions Turbo SHA-2. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
16 | Todor Mladenov, Saeid Nooshabadi |
Implementation of reconfigurable SHA-2 hardware core. |
APCCAS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Danilo Gligoroski, Svein Johan Knapskog |
Turbo SHA-2. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Local Collisions for the SHA-2 Hash Family. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
16 | Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon |
Multi-mode operator for SHA-2 hash functions. |
J. Syst. Archit. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon |
Multi-Mode Operator for SHA-2 Hash Functions. |
ERSA |
2006 |
DBLP BibTeX RDF |
|
16 | Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane |
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. |
ISVLSI |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Nicolas Sklavos 0001, Odysseas G. Koufopavlou |
Implementation of the SHA-2 Hash Family Standard Using FPGAs. |
J. Supercomput. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Nils Bruin |
Visualising Sha[2] in Abelian surfaces. |
Math. Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philip Hawkes, Michael Paddon, Gregory G. Rose |
On Corrective Patterns for the SHA-2 Family. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
11 | Florian Mendel, Martin Schläffer |
On Free-Start Collisions and Collisions for TIB3. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
SHA-3 competition, TIB3, free-start collision, Hash function, collision attack |
11 | Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee |
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Gaoli Wang |
Related-Key Rectangle Attack on 43-Round SHACAL-2. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack |
11 | YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 |
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Differential-Linear Type Attacks, SHACAL-2, Block Cipher |
11 | Jongsung Kim, Guil Kim, Sangjin Lee 0002, Jongin Lim 0001, Jung Hwan Song |
Related-Key Attacks on Reduced Rounds of SHACAL-2. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 |
Impossible Differential Attack on 30-Round SHACAL-2. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
2 | Xu Yang, Shaowei Wang 0002, Yi Li, Shaohua Wang 0002 |
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! |
ICSE |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vishal Gotarane, Satheesh Abimannan, Shahid Hussain 0002, Reyazur Rashid Irshad |
A Hybrid Framework Leveraging Whale Optimization and Deep Learning With Trust-Index for Attack Identification in IoT Networks. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Reyazur Rashid Irshad, Zakir Hussain, Ihtisham Hussain, Shahid Hussain 0002, Ehtisham Asghar, Ibrahim M. Alwayle, Khaled M. Alalayah, Adil Yousif, Awad Ali |
Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Waleed Alam, Muhammad Tahir 0007, Shahid Hussain 0002, Sarah Gul, Maqsood Hayat, Reyazur Rashid Irshad, Fabiano Pallonetto |
Unveiling the Potential Pattern Representation of RNA 5-Methyluridine Modification Sites Through a Novel Feature Fusion Model Leveraging Convolutional Neural Network and Tetranucleotide Composition. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Shukla, Shahid Hussain 0002, Reyazur Rashid Irshad, Ahmed Abdu Alattab, Subhasis Thakur, John G. Breslin, Mohd Fadzil Hassan 0001, Satheesh Abimannan, Moh. Shahid Husain, Syed Muslim Jameel |
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning. |
Comput. Stand. Interfaces |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Junaid Khan Kakar, Shahid Hussain 0002, Sang Cheol Kim, Hyongsuk Kim |
TimeTector: A Twin-Branch Approach for Unsupervised Anomaly Detection in Livestock Sensor Noisy Data (TT-TBAD). |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Shahid Khan 0002, Joost-Pieter Katoen, Marc Bouissou |
A Compositional Semantics of Boolean-Logic Driven Markov Processes. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Liu, Qu Luo, Zi Long Liu 0001, Shan Luo 0002, Pei Xiao, Rongping Lin |
BER Analysis of SCMA-OFDM Systems in the Presence of Carrier Frequency Offset. |
IEEE Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Wentao Ma, Xinyi Wu, Shan Zhao 0002, Tongqing Zhou, Dan Guo, Lichuan Gu, Zhiping Cai, Meng Wang 0001 |
FedSH: Towards Privacy-Preserving Text-Based Person Re-Identification. |
IEEE Trans. Multim. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xinyi Wu, Wentao Ma, Dan Guo, Tongqing Zhou, Shan Zhao 0002, Zhiping Cai |
Text-Based Occluded Person Re-identification via Multi-Granularity Contrastive Consistency Learning. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Juan Zou, Tingrui Pei, Cheng Li 0008, Ruoyou Wu, Shanshan Wang 0002 |
Self-Supervised Federated Learning for Fast MR Imaging. |
IEEE Trans. Instrum. Meas. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1056 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|