Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 219 matches
- 2023
- Teddy Lazebnik, Liron Simon Keren:
Cancer-inspired genomics mapper model for the generation of synthetic DNA sequences with desired genomics signatures. Comput. Biol. Medicine 164: 107221 (2023) - Naouel Arab, Hassiba Nemmour, Youcef Chibani:
A new synthetic feature generation scheme based on artificial immune systems for robust offline signature verification. Expert Syst. Appl. 213(Part): 119306 (2023) - Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe:
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. J. Inf. Process. 31: 591-601 (2023) - Minjoo Sim, Siwoo Eum, Gyeongju Song, Yujin Yang, Wonwoong Kim, Hwajeong Seo:
K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms. Sensors 23(17): 7558 (2023) - Duc Tri Nguyen, Kris Gaj:
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions. AFRICACRYPT 2023: 417-441 - Agustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael M. Estepa-Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo:
HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments. EICC 2023: 65-70 - Suneel Kumar, Mona Singh, Ruchilekha, Manoj Kumar Singh:
Semantic Segmentation Based Image Signature Generation for CBIR. IHCI (2) 2023: 319-329 - Rasik Rashid Malik, Vipin Joshi, Rajarshi Roy Chaudhuri, Mehak Ashraf Mir, Zubear Khan, Avinas N. Shaji, Madhura Bhattacharya, Anup T. Vitthal, Mayank Shrivastava:
Signatures of Positive Gate Over-Drive Induced Hole Trap Generation and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs. IRPS 2023: 1-4 - Ovishake Sen, Baibhab Chatterjee:
Invited: Ring-Oscillator Physical Unclonable Function (RO-PUF) Based PRBS Generation as a Device Signature in Distributed Brain Implants. MWSCAS 2023: 439-443 - Pere Díaz Lozano, Toni Lozano Bagén, Josep Vives:
Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1 metric. CoRR abs/2301.01315 (2023) - Teddy Lazebnik, Liron Simon Keren:
Cancer-inspired Genomics Mapper Model for the Generation of Synthetic DNA Sequences with Desired Genomics Signatures. CoRR abs/2305.01475 (2023) - Ovishake Sen, Baibhab Chatterjee:
Modified Ring-Oscillator Physical Unclonable Function (RO-PUF) based PRBS Generation as a Device Signature in Distributed Brain Implants. CoRR abs/2305.05775 (2023) - 2022
- David Thompson, Haibo Wang:
Integrated Power Signature Generation Circuit for IoT Abnormality Detection. ACM J. Emerg. Technol. Comput. Syst. 18(1): 5:1-5:13 (2022) - Kaoru Masada, Ryohei Nakayama, Makoto Ikeda:
Hardware Acceleration of Aggregate Signature Generation and Authentication by BLS Signature over BLS12-381 curve. COOL CHIPS 2022: 1-3 - Zhixin Shi, Xiangyu Wang, Pengcheng Liu:
NBP-MS: Malware Signature Generation Based on Network Behavior Profiling. ICPR 2022: 1865-1870 - 2021
- Lakshmi Chandrasekaran, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:
Genetic and chaotic signatures in offspring - an encrypted generation of image family. Multim. Tools Appl. 80(6): 8581-8609 (2021) - Min Du, Wenjun Hu, William Hewlett:
AutoCombo: Automatic Malware Signature Generation Through Combination Rule Mining. CIKM 2021: 3777-3786 - Yasuhiko Ikematsu:
A Study on Randomness Used in Signature Generation of UOV. ICMC 2021: 39-50 - Ibrahim Alnujaim, Youngwook Kim:
Application of Conditional Generative Adversarial Networks for Generation of Micro-Doppler Signatures of Different Aspect Angles. IGARSS 2021: 5056-5058 - Yifeng Song, Xiao Hu, Wenhao Wang, Jing Tian, Zhongfeng Wang:
High-Speed and Scalable FPGA Implementation of the Key Generation for the Leighton-Micali Signature Protocol. ISCAS 2021: 1-5 - Maya Kapoor, Garrett Fuchs, Jonathan Quance:
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection. NCA 2021: 1-9 - Haruhisa Kosuge, Hidema Tanaka:
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS{MT}}$. SAC 2021: 377-397 - 2020
- Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - Jungpil Shin, Md. Abdur Rahim, Md. Rashedul Islam, Keun Soo Yun:
A novel approach of cursive signature generation for personal identity. Int. J. Comput. Appl. Technol. 62(4): 384-394 (2020) - Ting Chen, Haiqing He, Dajun Li, Puyang An, Zhenyang Hui:
Damage Signature Generation of Revetment Surface along Urban Rivers Using UAV-Based Mapping. ISPRS Int. J. Geo Inf. 9(4): 283 (2020) - Victoria Ruíz, Ismael Linares, Ángel Sánchez, José Francisco Vélez:
Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks. Neurocomputing 374: 30-41 (2020) - Marcin Zalasinski, Krzysztof Cpalka, Lukasz Laskowski, Donald C. Wunsch, Krzysztof Przybyszewski:
An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature Hybrid Descriptors. J. Artif. Intell. Soft Comput. Res. 10(3): 173-187 (2020) - Vasileios Stathias, John Paul Turner, Amar Koleti, Dusica Vidovic, Daniel J. Cooper, Mehdi Fazel-Najafabadi, Marcin Pilarczyk, Raymond Terryn, Caty Chung, Afoma Umeano, Daniel J. B. Clarke, Alexander Lachmann, John Erol Evangelista, Avi Ma'ayan, Mario Medvedovic, Stephan C. Schürer:
LINCS Data Portal 2.0: next generation access point for perturbation-response signatures. Nucleic Acids Res. 48(Database-Issue): D431-D439 (2020) - Sanmeet Kaur, Maninder Singh:
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks. Neural Comput. Appl. 32(12): 7859-7877 (2020) - Daniel Nahmias, Aviad Cohen, Nir Nissim, Yuval Elovici:
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks 124: 243-257 (2020)
skipping 189 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-11 09:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint