Kim, Kwangjo.
Overview
| Works: | 1 works in 2 publications in 1 languages | |
|---|---|---|
Titles
Network Intrusion Detection using Deep Learning = A Feature Learning Approach /
by:
SpringerLink (Online service); Kim, Kwangjo.; Tanuwidjaja, Harry Chandra.; Aminanto, Muhamad Erza.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Privacy-Preserving Deep Learning = A Comprehensive Survey /
by:
Tanuwidjaja, Harry Chandra.; SpringerLink (Online service); Kim, Kwangjo.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/aut]
Network intrusion detection using deep learning = a feature learning approach /
by:
Aminanto, Muhamad Erza.; SpringerLink (Online service); Kim, Kwangjo.; Tanuwidjaja, Harry Chandra.
(Language materials, printed)
Practical post-quantum signatures = FALCON and SOLMAE with Python /
by:
SpringerLink (Online service); Kim, Kwangjo.
(Language materials, printed)
Information and Communications Security = 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers /
by:
SpringerLink (Online service); Kim, Kwangjo.; Liu, Dongmei.; Qing, Sihan.; Okamoto, Eiji.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Subjects
Quantum computing
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Computer software.
Data protection.
Artificial intelligence.
Computer Communication Networks.
Wireless and Mobile Communication.
Machine learning.
Privacy.
Mobile communication systems.
Quantum Communications and Cryptography.
Computers and civilization.
Algorithms.
Big Data.
Computer communication systems.
Management of Computing and Information Systems.
Security.
Artificial Intelligence (incl. Robotics)
Data mining.
Artificial Intelligence.
Professional Computing.
Data encryption (Computer science).
Cryptology.
Computers and Society.
Machine Learning.
Quantum Computing.
Wireless communication systems.
Computer science.
Management information systems.
Big data.
Data and Information Security.
Digital signatures.
Computer security.
Data Mining and Knowledge Discovery.