33 results on '"Yinan Kong"'
Search Results
2. Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices.
3. Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning Approach.
4. FPGA Implementation of Modular Multiplier in Residue Number System.
5. Frequency-domain information along with LSTM and GRU methods for histopathological breast-image classification.
6. A novel angle-restricted test zone search algorithm for performance improvement of HEVC.
7. Local and Global Feature Utilization for Breast Image Classification by Convolutional Neural Network.
8. Breast Image Classification Based on Concatenated Statistical, Structural and Textural Features.
9. Performance Analysis of Integrated Canny and Fuzzy-Logic Based (2-by-2 Cell Block) Edge-Detection Algorithms.
10. An Efficient ASIC Design of Variable-Length Discrete Cosine Transform for HEVC.
11. High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163).
12. Performance Analysis of Integrated Canny and Fuzzy Logic Based (3-by-3 Cell Block) Edge Detection Algorithms.
13. High-Speed, Area-Efficient, FPGA-Based Elliptic Curve Cryptographic Processor over NIST Binary Fields.
14. High-Performance FPGA Implementation of Modular Inversion over F_256 for Elliptic Curve Cryptography.
15. FPGA-based efficient modular multiplication for Elliptic Curve Cryptography.
16. Multi-class SVMs analysis of side-channel information of elliptic curve cryptosystem.
17. A low-cost architecture for DWT filter banks in RNS applications.
18. A novel approach for improving error detection and correction in WSN.
19. Operational capability and suitability of image compression methods for different applications.
20. Novel implementation of full adder based scaling in Residue Number Systems.
21. Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements.
22. Digital traffic controller on the Altium NanoBoard.
23. Four tap Daubechies filter banks based on RNS.
24. An implementation of a scaler in the Residue number System.
25. Multi-class SVMs analysis of side-channel information of elliptic curve cryptosystem.
26. Side channel analysis of an elliptic curve crypto-system based on multi-class classification.
27. Performance analysis of Wallace and radix-4 Booth-Wallace multipliers.
28. Performance analysis of Canny's edge detection method for modified threshold algorithms.
29. A novel approach for improving error detection and correction in WSN.
30. Four tap Daubechies filter banks based on RNS.
31. Digital traffic controller on the Altium NanoBoard.
32. Channel Operations in the Residue Number System with Special Modulus on Hardware.
33. Comparison of Montgomery and Barrett modular multipliers on FPGAs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.