Search

Your search keyword '"DaeHun Nyang"' showing total 40 results

Search Constraints

Start Over You searched for: Author "DaeHun Nyang" Remove constraint Author: "DaeHun Nyang" Language english Remove constraint Language: english
40 results on '"DaeHun Nyang"'

Search Results

1. WBC image classification and generative models based on convolutional neural network

2. Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches

3. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

4. Empirically comparing the performance of blockchain's consensus algorithms

5. Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet

6. Measuring the Cost of Software Vulnerabilities

7. Special Issue on Cyber Security and AI

8. Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering

9. ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

10. Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

11. A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

12. Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

13. Large-scale and Robust Code Authorship Identification with Deep Feature Learning.

14. A simple proof of optimality for the MIN cache replacement policy

15. Measuring the Cost of Software Vulnerabilities.

16. Information Security and Cryptology - ICISC 2010 : 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

21. Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features.

22. Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network.

23. On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network.

24. Proactive Code Verification Protocol in Wireless Sensor Network.

25. Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.

27. Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.

29. Preventing Double-Spent Coins from Revealing User's Whole Secret.

30. A Software-Based Group Attestation for Wireless Sensor Networks.

32. On the Security of Two Group Signature Schemes with Forward Security.

33. Grid-Based Key Pre-Distribution in Wireless Sensor Networks.

34. Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks.

Catalog

Books, media, physical & digital resources