Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control
Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
Can we predict useful comments in source codes? - Analysis of findings from Information Retrieval in Software Engineering Track @ FIRE 2022
10.1145/3574318.3574329
Phase Frequency Detector Using CNTFET
10.1007/978-981-19-4364-5_62
Overview of the HASOC Subtrack at FIRE 2022: Hate Speech and Offensive Content Identification in English and Indo-Aryan Languages
10.1145/3574318.3574326
A Study and Investigation of Structural Parameters of Vertically Aligned Carbon Nanotube Arrays as a Thermal Interface Material
10.1007/978-981-19-4364-5_16
Data Poisoning Attack by Label Flipping on SplitFed Learning
10.1007/978-3-031-23599-3_30
Analysis and Simulation of Various Parameters of Mixed CNT Bundle for Interconnect Applications
10.1007/978-981-19-4364-5_78
Targeted Clean-Label Poisoning Attacks on Federated Learning
10.1007/978-3-031-23599-3_17
Analysis of Graphene Field-Effect Transistor (GFET) as a Sensor
10.1007/978-981-19-4364-5_5
Application-Based Evaluation of Neural Network Architectures for Edge Devices
10.1201/9781003320333