|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 64 occurrences of 58 keywords
|
|
|
Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
155 | Peter Muhlberger |
Should e-government design for citizen participation?: stealth democracy and deliberation. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
democratic deliberation, human agency, political apathy, political discussion, stealth democracy, online deliberation, political participation |
130 | Aaron Striegel |
Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Multicast Deployment, QoS, Routing |
82 | Andrew MacQuire, Andrew Brampton, Idris A. Rai, Laurent Mathy |
Performance Analysis of Stealth DHT with Mobile Nodes. |
PerCom Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
79 | David Salyers, Aaron Striegel |
A Novel Approach for Transparent Bandwidth Conservation. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Jason F. Cantin, Mikko H. Lipasti, James E. Smith 0001 |
Stealth prefetching. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
multiprocessors, prefetching, coherence |
66 | Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski |
Detecting Stealth Software with Strider GhostBuster. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Markus Jakobsson, XiaoFeng Wang 0001, Susanne Wetzel |
Stealth attacks in vehicular technologies. |
VTC Fall (2) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Phillip Krueger, Rohit Chawla |
The Stealth distributed scheduler. |
ICDCS |
1991 |
DBLP DOI BibTeX RDF |
|
60 | Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Stealth distributed hash table: a robust and flexible super-peered DHT. |
CoNEXT |
2006 |
DBLP DOI BibTeX RDF |
stealth DHT, peer-to-peer, distributed hash tables |
50 | Amit Vasudevan, Ramesh Yerraballi |
Stealth Breakpoints. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Márk Jelasity, Vilmos Bilicki |
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
48 | William H. Allen, Richard Ford |
How Not to Be Seen II: The Defenders Fight Back. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Richard Ford, William H. Allen |
How Not to Be Seen. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Stealth distributed hash table: unleashing the real potential of peer-to-peer. |
CoNEXT |
2005 |
DBLP DOI BibTeX RDF |
stealth DHT, peer-to-peer, distributed hash tables |
42 | Byoungyoung Lee, Yuna Kim, Jong Kim 0001 |
binOb+: a framework for potent and stealthy binary obfuscation. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
binary obfuscation, stealth, windows SEH, reverse engineering, exception handling |
42 | Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 |
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
stealth malware, hardware-assisted VMM, Virtual machine monitor |
42 | Barry G. Silverman, Michael Johns, Ransom Weaver, Joshua Mosley |
Authoring Edutainment Stories for Online Players (AESOP): Introducing Gameplay into Interactive Dramas. |
International Conference on Virtual Storytelling |
2003 |
DBLP DOI BibTeX RDF |
videogame generator, stealth learning, agent ap- proach, training, interactive drama, role-playing games |
37 | Jinhua Tao, Shi Qiu, Shaoli Liu, Tianshi Chen 0002, Rui Mao 0001 |
Stealth-ACK: stealth transmissions of NoC acknowledgements. |
Sci. China Inf. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
37 | Zhe Zhao, Yifeng Niu, Zhaowei Ma, Xiaoting Ji |
A fast stealth trajectory planning algorithm for stealth UAV to fly in multi-radar network. |
RCAR |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Hee Park, Jeong-Sik Choi, Jimin Kim, Beom Hee Lee 0001 |
Roadmap-based stealth navigation for intercepting an invader. |
ICRA |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Wu-chang Feng, Edward C. Kaiser, Travis Schluessler |
Stealth measurements for cheat detection in on-line games. |
NETGAMES |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Robert Strandh, John Hamer, Gilbert Baumann |
Using Stealth Mixins to Achieve Modularity. |
ASWEC |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Andrew MacQuire, Andrew Brampton, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Authentication in Stealth Distributed Hash Tables. |
EUROMICRO-SEAA |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Amit Vasudevan, Ramesh Yerraballi |
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Stephen Weiss |
Teaching design patterns by stealth. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
programming pedagogy, design patterns |
34 | Peter Smet, Don Gossink, Greg Calbert |
The Value of Stealth in the Game of Chess. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita |
Stealth Vision for Protecting Privacy. |
ICPR (4) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Aleksandra Korolova, Ayman Farahat, Philippe Golle |
Enhancing the privacy of web-based communication. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
privacy, profiling, protection |
32 | Lauren Davis 0001 |
Liemandt Foundation launches hidden agenda contest: university students vie for a $25, 000 prize by building video games that secretly teach middle school subjects. |
Comput. Entertain. |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Scott Beattie |
Sam Fisher versus Immanuel Kant: the ethics of interactive media. |
IE |
2007 |
DBLP BibTeX RDF |
stealth games, ethics, interactive media |
26 | Salvatore J. Stolfo |
Worm and Attack Early Warning. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
worminator, stealth, scan, probe, cyberattack |
26 | Barry G. Silverman, Michael Johns, Ransom Weaver |
Satisfying the Perceived Need for Free-Play in Pedagogically Oriented Interactive Dramas. |
CASA |
2003 |
DBLP DOI BibTeX RDF |
videogame generator, stealth learning, training, role playing games, story telling, systems approach |
18 | Jie He, Xin Zhao, Jianxun Wang 0008, Chao Zuo, Zuoshuai Wang |
High-Dimensional Multiobjective Optimization Design for Magnetic Stealth of Underwater Vehicle Based on Improved MSOPS Algorithm. |
IEEE Trans. Instrum. Meas. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Abdullah H. Alqahtani |
An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Beltran Lopez, Pantaleone Nespoli, Manuel Gil Pérez |
Cyber Deception Reactive: TCP Stealth Redirection to On-Demand Honeypots. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Xue Xiong, Beixiong Zheng, A. Lee Swindlehurst, Jie Tang 0002, Wen Wu |
A New Intelligent Reflecting Surface-Aided Electromagnetic Stealth Strategy. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Dineshkumar Rajendran, Prasanna Santhanam |
Leveraging ensemble learning for stealth assessment model with game-based learning environment. |
Soft Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic |
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Qi Chang, Jinzu Ji, Ke Chen, Wenxing Wu, Yunpeng Ma |
Transparent and Ultra-Thin Flexible Checkerboard Metasurface for Radar-Infrared Bi-Stealth. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Xin Wang, Li Lin, Yao Wang |
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jianbo Wang, Jianyu Ye, Xiao-Liang Wu, Jianqing Sun, Guang Hua 0002 |
RCS Statistical Modeling of Stealth Targets Based on Fractional-Order Legendre Polynomials. |
IEEE Trans. Aerosp. Electron. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Baisakhi Bandyopadhyay, Sudeb Bhattacharya, Rahul Kumar Jaiswal, Mondeep Saikia, Kumar Vaibhav Srivastava |
Wideband RCS Reduction of a Linear Patch Antenna Array Using AMC Metasurface for Stealth Applications. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison |
Stealth Data Injection Attacks With Sparsity Constraints. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ke Sun 0014, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor |
Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Min Du, Lianhong Wang, Yicong Zhou |
High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ying Fang, Tong Li, Linh Huynh, Katerina Christhilf, Rod D. Roscoe, Danielle S. McNamara |
Stealth Literacy Assessments via Educational Games. |
Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Danielle S. McNamara, Tracy Arner, Reese Butterfuss, Ying Fang, Micah Watanabe, Natalie Newton, Kathryn S. McCarthy, Laura K. Allen, Rod D. Roscoe |
iSTART: Adaptive Comprehension Strategy Training and Stealth Literacy Assessment. |
Int. J. Hum. Comput. Interact. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alex Kovács, István András Seres |
Anonymity Analysis of the Umbra Stealth Address Scheme on Ethereum. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani |
Stealth Shaper: Reflectivity Optimization as Surface Stylization. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anton Wahrstätter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin, Davor Svetinovic |
BaseSAP: Modular Stealth Address Protocol for Programmable Blockchains. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuping Yan, George Shao, Dennis Song, Mason Song, Yaochu Jin |
HE-DKSAP: Privacy-Preserving Stealth Address Protocol via Additively Homomorphic Encryption. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lauren Alvarez, Tim Menzies |
Don't Lie to Me: Avoiding Malicious Explanations with STEALTH. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marija Mikic, Mihajlo Srbakoski |
Elliptic Curve Pairing Stealth Address Protocols. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov |
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lauren Alvarez, Tim Menzies |
Don't Lie to Me: Avoiding Malicious Explanations With STEALTH. |
IEEE Softw. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik |
Post Quantum Fuzzy Stealth Signatures and Applications. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Marc Fischlin |
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Jeffrey Anderson, Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Mario Harper |
Stealth Centric Autonomous Robot Simulator (SCARS). |
Softw. Impacts |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Miroslav Svítek, Olga Kosheleva, Vladik Kreinovich |
Freedom of Will, Non-uniqueness of Cauchy Problem, Fractal Processes, Renormalization, Phase Transitions, and Stealth Aircraft. |
Uncertainty, Constraints, and Decision Making |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anisha Gupta, Dan Carpenter, Wookhee Min, Bradford W. Mott, Krista D. Glazewski, Cindy E. Hmelo-Silver, James C. Lester |
Enhancing Stealth Assessment in Collaborative Game-Based Learning with Multi-task Learning. |
AIED |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik |
Post Quantum Fuzzy Stealth Signatures and Applications. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marc Fischlin |
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gabriele Gualandi, Alessandro V. Papadopoulos |
Worst-Case Impact Assessment of Multi-Alarm Stealth Attacks Against Control Systems with CUSUM-Based Anomaly Detection. |
ACSOS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pengfei Zhang, Xiong Cheng, Yao Ma, Jun Liu, Liyan Zhu, Daying Sun, Xiaodong Huang |
Efficient and Accurate Design of Infrared and Laser-Compatible Stealth Metasurface Using Bidirectional Artificial Neural Network. |
MHS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mary K. McIntosh, Sean Christie |
Opportunities and challenges for robotic-assisted spine surgery: feasible indications for the MAZOR™ X Stealth Edition. |
EMBC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Maxim Goukhshtein, Stark C. Draper |
Polar Coded Distribution Matching for Probabilistic Shaping and Stealth Communication. |
ISTC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wael Al Enezi, Clark Verbrugge |
Investigating the Influence of Behaviors and Dialogs on Player Enjoyment in Stealth Games. |
AIIDE |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wael Al Enezi, Clark Verbrugge |
Evaluating Player Experience in Stealth Games: Dynamic Guard Patrol Behavior Study. |
AIIDE |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zihan Xue, Jinchi Han, Wei Song 0002 |
CTPP: A Fast and Stealth Algorithm for Searching Eviction Sets on Intel Processors. |
RAID |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Michael G. Christel, Angelina Shi, James Finkel, Hannah Baxter, Hsuan-Ju Wang, Yuchan Wu, Ricardo Washingon, Bryan S. Maher, John Balash |
Power Core Values: Teaching Racial Bias Awareness Through a Stealth Game and Workshop. |
JCSG |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kenji Tojo, Ariel Shamir, Bernd Bickel, Nobuyuki Umetani |
Stealth Shaper: Reflectivity Optimization as Surface Stylization. |
SIGGRAPH (Conference Paper Track) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Manoj Prabhakar K, Vipin Pavithran, Saranya Chandran, Sreelakshmi R. Syam |
Long-Range Stealth Mode Wi-Fi Surveillance and Interception System. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Loïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov |
Execution at RISC: Stealth JOP Attacks on RISC-V Applications. |
ESORICS Workshops (2) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl |
Modeling Obfuscation Stealth Through Code Complexity. |
ESORICS Workshops (2) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Miguel Sánchez Sánchez, Enrique Tomás Martínez Beltrán, Alberto Huertas Celdrán, Robin Wassink, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller |
Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield. |
MILCOM |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hauke Heseding, Moritz Dieing, Ankush Meshram, Martina Zitterbart |
Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems. |
INDIN |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ryan Anderson, Taylor Anderson 0002, Carter Bailey, Jeffrey Anderson, Mario Harper |
Stealth Centric A*: Bio-Inspired Navigation for Ground Robots. |
IRC |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Yu, Zhao Li, Xu Qiao, Yu-an Tan 0001, Yuanzhang Li, Li Zhang |
A Stealth Security Hardening Method Based on SSD Firmware Function Extension. |
ICONIP (9) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ioannis Kazoleas, Panagiotis Karampelas |
A novel malicious remote administration tool using stealth and self-defense techniques. |
Int. J. Inf. Sec. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Wenjie Wang, Jinming Jiang, Jiangang Liang, Zhenxu Wang, Cuilian Xu, Yongfeng Li, Lin Zheng 0005, Yueyu Meng, Jiafu Wang, Shaobo Qu |
A Multifunctional Coating for Radar-Infrared Stealth-Compatible at High Temperatures. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang |
The Optimization of Warhead and QRCS Simulation for a Stealth Missile. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Dineshkumar Rajendran, S. Prasanna |
Stealth assessment strategy in distributed systems using optimal deep learning with game based learning. |
J. Supercomput. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Osman Boyaci, Mohammad Rasoul Narimani, Katherine R. Davis 0001, Muhammad Ismail 0001, Thomas J. Overbye, Erchin Serpedin |
Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids Using Graph Neural Networks. |
IEEE Trans. Smart Grid |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiao-Lei Wang, Guang-Hong Yang, Dianhua Zhang |
Optimal Stealth Attack Strategy Design for Linear Cyber-Physical Systems. |
IEEE Trans. Cybern. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Abdulrahman Takiddin, Suman Rath, Muhammad Ismail 0001, Subham Sahoo |
Data-Driven Detection of Stealth Cyber-Attacks in DC Microgrids. |
IEEE Syst. J. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Osman Boyaci, Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Muhammad Ismail 0001, Katherine R. Davis 0001, Erchin Serpedin |
Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids. |
IEEE Syst. J. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jiaqi Yu, Wenchao Ma, Jewoong Moon, André R. Denham |
Developing a Stealth Assessment System Using a Continuous Conjunctive Model. |
J. Learn. Anal. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison |
Stealth Data Injection Attacks with Sparsity Constraints. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
18 | Weizhou Li, Zhiqiang Lin, Qi Chen |
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. |
Secur. Commun. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jinwei Jia, Zhuangzhi Han, Yuying Liang, Limin Liu, Xuetian Wang |
Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback. |
Entropy |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jinwei Jia, Limin Liu, Yuying Liang, Zhuangzhi Han, Xuetian Wang |
Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology. |
Entropy |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Xin Yin, Zhen Liu 0008, Guomin Yang, Guoxing Chen, Haojin Zhu |
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
18 | Shaoze Lu, Zhijun Meng, Jun Huang, Mingxu Yi, Zeyang Wang |
Study on Quantum Radar Detection Probability Based on Flying-Wing Stealth Aircraft. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang, Xiaorong Ke, Yining Liu |
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. |
IEEE Trans. Dependable Secur. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Moonseok Jang, Kexin Wang, Sangjin Lee 0001, Hyeonggyu Jeong, In-Yeong Song, Yong Ho Song, Jungwook Choi |
Achieving low write latency through new stealth program operation supporting early write completion in NAND flash memory. |
J. Syst. Archit. |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu |
Stealth: A Heterogeneous Covert Access Channel for Mix-net. |
DSC |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Nathan L. Henderson, Halim Acosta, Wookhee Min, Bradford W. Mott, Trudi Lord, Frieda Reichsman, Chad Dorsey, Eric N. Wiebe, James C. Lester |
Enhancing Stealth Assessment in Game-Based Learning Environments with Generative Zero-Shot Learning. |
EDM |
2022 |
DBLP BibTeX RDF |
|
18 | Alan Oliveira de Sá, Lucila Maria Souza Bento, Mariana Luiza Flavio, Marco Pasetti, Paolo Ferrari, Emiliano Sisinni |
ANN-Based Stealth Attack to Battery Energy Storage Systems by Using a Low-Cost Device. |
MetroInd4.0& IoT |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Young Seo Lee, Gunjae Koo, Young-Ho Gong, Sung Woo Chung |
Stealth ECC: A Data-Width Aware Adaptive ECC Scheme for DRAM Error Resilience. |
DATE |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 381 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|