Author of the publication

An Approximate Flow Betweenness Centrality Measure for Complex Network.

, , , , and . IEICE Trans. Inf. Syst., 96-D (3): 727-730 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , and . COSADE, volume 7275 of Lecture Notes in Computer Science, page 231-248. Springer, (2012)Optimized Lightweight Hardware Trojan-Based Fault Attack on DES., , , , , , and . ICPADS, page 654-661. IEEE, (2018)Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition., , , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1475-1499 (2018)MDC-Checker: A novel network risk assessment framework for multiple domain configurations., , , , and . Comput. Secur., (2019)A Covert Attack Method Against FPGA Clouds., , , and . ATS, page 1-6. IEEE, (2023)PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior., , , , , , and . ACSAC, page 580-593. ACM, (2023)Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering., , , , , , and . FDTC, page 29-39. IEEE Computer Society, (2014)Speaker Transformation Using Length-Variable Moving Window Based GMM., and . HIS (1), page 308-312. IEEE Computer Society, (2009)Variable Sliding Window DTW Speech Identification Algorithm., and . HIS (1), page 304-307. IEEE Computer Society, (2009)Image Retrieval Based on Structured Local Binary Kirsch Pattern., , , , and . IEICE Trans. Inf. Syst., 96-D (5): 1230-1232 (2013)