From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prediction of plant secondary metabolic pathways using deep transfer learning., , , , , и . BMC Bioinform., 24 (1): 348 (декабря 2023)Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts., , , , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023 (2): 519-542 (2023)Enhanced Side-Channel Cube Attacks on PRESENT., , , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 332-339 (2013)HTS filter subsystem for future mobile communication system., , , , , и . Sci. China Ser. F Inf. Sci., 51 (9): 1384-1390 (2008)A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers., , , , , , и . IEEE Trans. Inf. Forensics Secur., 11 (5): 1039-1054 (2016)Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition., , , , , и . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1475-1499 (2018)Organizational Geosocial Network: A Graph Machine Learning Approach Integrating Geographic and Public Policy Information for Studying the Development of Social Organizations in China., , и . ISPRS Int. J. Geo Inf., 11 (5): 318 (2022)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , и . FDTC, стр. 29-39. IEEE Computer Society, (2014)A New Architecture for Cloud Computing System Protection., , , и . CBD, стр. 46-50. IEEE Computer Society, (2013)Persistent Fault Attack in Practice., , , , , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (2): 172-195 (2020)