Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control
Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
Analysis and Simulation of Various Parameters of Mixed CNT Bundle for Interconnect Applications
10.1007/978-981-19-4364-5_78
Data Poisoning Attack by Label Flipping on SplitFed Learning
10.1007/978-3-031-23599-3_30
Analysis of Graphene Field-Effect Transistor (GFET) as a Sensor
10.1007/978-981-19-4364-5_5
Targeted Clean-Label Poisoning Attacks on Federated Learning
10.1007/978-3-031-23599-3_17
ASIC Implementation of a 16-Bit Brent–Kung Adder at 45 nm Technology Node
10.1007/978-981-19-4364-5_8
Application-Based Evaluation of Neural Network Architectures for Edge Devices
10.1201/9781003320333
Performance Analysis of DGFET, MESFET, and SOI on Varying Device Intrinsic Input Parameters
10.1007/978-981-19-4364-5_30
Comparative Evaluation on Sentiment Analysis Algorithms
10.1007/978-3-031-23116-2_9
Performative Analysis on Ion-Sensitive Field-Effect Transistor by Varying Intrinsic Parameter
10.1007/978-981-19-4364-5_46