Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control
Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
RDF Query Processing: Relational Versus Graph Approach
10.1007/978-981-19-5037-7_41
synchronous Test Equivalence over Timed Processes
10.1007/978-3-031-35257-7_7
Workload aware Cost-based Partial loading of Raw data for Limited Storage Resources
10.1007/978-981-19-5037-7_74
Enhancing Transferability of Adversarial Audio in Speaker Recognition Systems
10.10.1007/978-3-031-36616-1_49
Diabetic Retinopathy Classification Using Pixel-Level Lesion Segmentation
10.1007/978-981-19-5037-7_29
Solvability and Controllability of a Retarded-Type Nonlocal Non-Autonomous Fractional Differential Equation
ISSN: 2356-9344, 01 Jul. 2023, pp. 473-486, 10.18576/pfda/090310
Generative Adversarial Network for Colorization of Mammograms
10.1007/978-981-19-5037-7_2
Existence of optimal pairs and solvability of non-autonomous fractional Sobolev-type integrodifferential equations
ISSN: 0975-7465, 04 Jul. 2023, pp. 1-12, 10.1007/s13226-023-00457-4
On the Efficacy of Deep Image Denoising for Computer Vision Applications
10.1007/978-981-19-5037-7_28