Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control
Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
Data Poisoning Attack by Label Flipping on SplitFed Learning
10.1007/978-3-031-23599-3_30
Analysis and Simulation of Various Parameters of Mixed CNT Bundle for Interconnect Applications
10.1007/978-981-19-4364-5_78
Targeted Clean-Label Poisoning Attacks on Federated Learning
10.1007/978-3-031-23599-3_17
Analysis of Graphene Field-Effect Transistor (GFET) as a Sensor
10.1007/978-981-19-4364-5_5
Application-Based Evaluation of Neural Network Architectures for Edge Devices
10.1201/9781003320333
ASIC Implementation of a 16-Bit Brent–Kung Adder at 45 nm Technology Node
10.1007/978-981-19-4364-5_8
Comparative Evaluation on Sentiment Analysis Algorithms
10.1007/978-3-031-23116-2_9
Performance Analysis of DGFET, MESFET, and SOI on Varying Device Intrinsic Input Parameters
10.1007/978-981-19-4364-5_30
A Report on the Fifth Workshop on Emerging Software Engineering Education (WESEE 2023)
10.1145/3578527.3581749