Author of the publication

Comparison of Cube Attacks Over Different Vector Spaces.

, , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 225-238. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage., , , , , , , , and . Hum. centric Comput. Inf. Sci., (2015)Deepfake attribution: On the source identification of artificially generated images., , and . WIREs Data Mining Knowl. Discov., (2022)Metrics for network forensics conviction evidence., , and . ICITST, page 1-8. IEEE, (2009)Guess-It-Generator: Generating in a Lewis Signaling Framework through Logical Reasoning., , , and . ACM Multimedia, page 6396-6405. ACM, (2022)Invisible emotion magnification algorithm (IEMA) for real-time micro-expression recognition with graph-based features., , , , , and . Multim. Tools Appl., 81 (7): 9151-9176 (2022)Graph Autoencoder-Based Embedded Learning in Dynamic Brain Networks for Autism Spectrum Disorder Identification., , , , and . ICIP, page 2891-2895. IEEE, (2022)Attacks on SVD-Based Watermarking Schemes., , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 83-91. Springer, (2008)Schatten p-norm based Image-to-Video Adaptation for Video Action Recognition., , , and . IJCNN, page 1-8. IEEE, (2023)Proxy Re-encryption with Keyword Search: New Definitions and Algorithms., , , and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 149-160. Springer, (2010)On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System., and . CITA, page 75-79. (2005)