From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A fuzzy integral-based intuitionistic decision system for evaluation and improvement of suppliers in supply chain management., , и . ICMLC, стр. 782-788. IEEE, (2014)Related-Key Differential Attack on Round Reduced RECTANGLE-80., , , , и . IACR Cryptology ePrint Archive, (2014)Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON., , , , , и . IACR Cryptology ePrint Archive, (2014)Practical Collision Attacks against Round-Reduced SHA-3., , , , , и . IACR Cryptology ePrint Archive, (2019)Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA., , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 379-394. Springer, (2016)Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies., , , и . IACR Cryptol. ePrint Arch., (2023)A Hierarchical Siamese Network for Noninvasive Staging of Liver Fibrosis Based on US Image Pairs of the Liver and Spleen., , , , , , и . Sensors, 23 (12): 5450 (2023)Security analysis of Subterranean 2.0., , , и . Des. Codes Cryptogr., 89 (8): 1875-1905 (2021)A comparison study of multi-class sentiment classification for Chinese reviews., , , , и . FSKD, стр. 2433-2436. IEEE, (2010)Improved Boomerang Attacks on Deoxys-BC., , , , и . IWSEC, том 14128 из Lecture Notes in Computer Science, стр. 59-76. Springer, (2023)