Author of the publication

Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization.

, , , , , and . J. Comput. Sci. Technol., 35 (5): 1175-1197 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameter Estimation for a k-out-of-n: F System., and . Communications in Statistics - Simulation and Computation, 43 (1): 99-114 (2014)The evolution of a clogging sidewalk caused by a dockless bicycle-sharing system: A stochastic particles model., , and . Math. Comput. Simul., (2020)Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks., , , , , , and . J. Comput. Sci. Technol., 34 (5): 1079-1095 (2019)DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN., , , , , , and . ICCCN, page 1-10. IEEE, (2022)A Power Analysis on SMS4 Using the Chosen Plaintext Method., , , , , and . CIS, page 748-752. IEEE Computer Society, (2013)Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1301-1316 (2018)A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games., , , , , and . ICME Workshops, page 6-10. IEEE, (2023)Practical Partial-Nonce-Exposure Attack on ECC Algorithm., , , , , , , , and . CIS, page 248-252. IEEE Computer Society, (2017)Correlation Power Analysis Against Stream Cipher MICKEY v2., , and . CIS, page 320-324. IEEE Computer Society, (2010)Malicious Domain Detection Based on K-means and SMOTE., , , , , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 468-481. Springer, (2020)