Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 878 matches
- 2024
- Xiaohu Liu, Defu Chen, Xianbao Wang, Sheng Xiang, Xuwen Zhou:
Rep-MCA-former: An efficient multi-scale convolution attention encoder for text-independent speaker verification. Comput. Speech Lang. 85: 101600 (2024) - Nayreet Islam, Akramul Azim:
A multi-mode real-time system verification model using efficient event-driven dataset. J. Ambient Intell. Humaniz. Comput. 15(2): 1187-1200 (2024) - Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, Qiang Ni:
3DVerifier: efficient robustness verification for 3D point cloud models. Mach. Learn. 113(4): 1771-1798 (2024) - Huangjun Zhu, Yunting Li, Tianyi Chen:
Efficient Verification of Ground States of Frustration-Free Hamiltonians. Quantum 8: 1221 (2024) - Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. IEEE Trans. Inf. Forensics Secur. 19: 2746-2760 (2024) - Fucai Luo, Saif Al-Kuwari, Yong Ding:
SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning. IEEE Trans. Mob. Comput. 23(1): 850-864 (2024) - Pei Huang, Haoze Wu, Yuting Yang, Ieva Daukantas, Min Wu, Yedi Zhang, Clark W. Barrett:
Towards Efficient Verification of Quantized Neural Networks. AAAI 2024: 21152-21160 - Marco Huber, Anh Thi Luu, Philipp Terhörst, Naser Damer:
Efficient Explainable Face Verification based on Similarity Score Argument Backpropagation. WACV 2024: 4724-4733 - Lionel Blatter, Nikolai Kosmatov, Virgile Prevosto, Pascale Le Gall:
An Efficient VCGen-based Modular Verification of Relational Properties. CoRR abs/2401.08385 (2024) - Luwei Cai, Fu Song, Taolue Chen:
Towards Efficient Verification of Constant-Time Cryptographic Implementations. CoRR abs/2402.13506 (2024) - Mufan Sang, John H. L. Hansen:
Efficient Adapter Tuning of Pre-trained Speech Models for Automatic Speaker Verification. CoRR abs/2403.00293 (2024) - Erwan Mahe, Boutheina Bannour, Christophe Gaston, Pascale Le Gall:
Efficient Interaction-Based Offline Runtime Verification of Distributed Systems with Lifeline Removal. CoRR abs/2403.03057 (2024) - 2023
- Faranak Nejati, Nor Asilah Wati Abdul Hamid, Sina Zangbari Koohi, Zahra Rahmani Zadeh:
An Incremental Optimization Algorithm for Efficient Verification of Graph Transformation Systems. IEEE Access 11: 75748-75760 (2023) - Moon Chan Park, Dong Hoon Lee:
BGCFI: Efficient Verification in Fine-Grained Control-Flow Integrity Based on Bipartite Graph. IEEE Access 11: 4291-4305 (2023) - Amir Mohammad Rostami, Mohammad Mehdi Homayounpour, Ahmad Nickabadi:
Efficient Attention Branch Network with Combined Loss Function for Automatic Speaker Verification Spoof Detection. Circuits Syst. Signal Process. 42(7): 4252-4270 (2023) - Ian G. Ludden, Douglas M. King, Sheldon H. Jacobson:
3D geo-graphs: Efficient flip verification for the spherical zoning problem. Discret. Appl. Math. 338: 329-346 (2023) - Hyeong Gu Lim, Jaeyeon Jang, Byung Kook Ju, Jae-Wook Ko, Chang Ouk Kim:
A test vector selection method based on machine learning for efficient presilicon verification. Expert Syst. Appl. 224: 120056 (2023) - Mohsen A. M. El-Bendary, Sabry S. Nassar:
Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification. Int. J. Speech Technol. 26(on): 379-394 (2023) - Junyan Guo, Ye Du, Dawei Zhang, Runfang Wu:
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network. J. Inf. Secur. Appl. 73: 103437 (2023) - Jiarui Yu, Jingsong Cui, Hang Tu, Chunwu Yu, Man Zhou:
A SM2 based efficient and lightweight batch verification approach for IC cards. J. Inf. Secur. Appl. 73: 103409 (2023) - Abdulrahman Alamer:
An efficient group signcryption scheme supporting batch verification for securing transmitted data in the Internet of Things. J. Ambient Intell. Humaniz. Comput. 14(5): 5885-5902 (2023) - Somchart Fugkeaw:
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain. J. Cloud Comput. 12(1): 111 (2023) - Mohsen A. M. El-Bendary, Osama S. Faragallah, Sabry S. Nassar:
An efficient hidden marking approach for forensic and contents verification of digital images. Multim. Tools Appl. 82(17): 25527-25558 (2023) - Pengfei Gao, Yedi Zhang, Fu Song, Taolue Chen, François-Xavier Standaert:
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks. Proc. ACM Program. Lang. 7(OOPSLA2): 1817-1847 (2023) - Ryan Shaffer, Hang Ren, Emiliia Dyrenkova, Christopher G. Yale, Daniel S. Lobser, Ashlyn D. Burch, Matthew N. H. Chow, Melissa C. Revelle, Susan M. Clark, Hartmut Häffner:
Sample-efficient verification of continuously-parameterized quantum gates for small quantum processors. Quantum 7: 997 (2023) - Xiuguang Li, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, Xiaoyuan Yang:
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. Sensors 23(9): 4307 (2023) - Pavel Parízek, Filip Kliber:
Checking Just Pairs of Threads for Efficient and Scalable Incremental Verification of Multithreaded Programs. ACM SIGSOFT Softw. Eng. Notes 48(1): 27-31 (2023) - Hongyuan Wang, Wanting Zhu, Baokai Zu, Yafang Li:
An Efficient and Universal Real-Time Data Integrity Verification Scheme Based on Symmetric Key in Stream Computing System. Symmetry 15(8): 1541 (2023) - Peng Yi, Jiguo Li, Yichen Zhang, Yu Chen:
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System. IEEE Trans. Aerosp. Electron. Syst. 59(2): 1292-1299 (2023) - Bei Liu, Zhengyang Chen, Yanmin Qian:
Depth-First Neural Architecture With Attentive Feature Fusion for Efficient Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 31: 1825-1838 (2023)
skipping 848 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 19:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint