Author of the publication

Analog circuit synthesis using two-port theory and genetic programming.

, , and . AFRICON, page 1-8. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption., , , and . IET Biom., 11 (5): 430-444 (September 2022)A multi-authority approach to various predicate encryption types., , and . Des. Codes Cryptogr., 88 (2): 363-390 (2020)Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Multiplication-Free Biometric Recognition for Faster Processing under Encryption., , , and . IJCB, page 1-9. IEEE, (2022)Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks., , , , , , and . AISec@CCS, page 13-24. ACM, (2022)Analog circuit synthesis using two-port theory and genetic programming., , and . AFRICON, page 1-8. IEEE, (2011)DEEPCASE: Semi-Supervised Contextual Analysis of Security Events., , , , , , , , , and . SP, page 522-539. IEEE, (2022)Obfuscated Access and Search Patterns in Searchable Encryption., , , and . NDSS, The Internet Society, (2021)Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds., , , and . MSWiM, page 213-222. ACM, (2022)Consolidation of Reward Memory during Sleep Does Not Require Dopaminergic Activation., , , , , and . J. Cogn. Neurosci., 32 (9): 1688-1703 (2020)