Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
program [2019/11/14 11:15] nakano |
program [2019/12/09 20:39] (current) nakano [Track5C] |
||
---|---|---|---|
Line 126: | Line 126: | ||
* Chair: Hiroaki Anada (University of Nagasaki) | * Chair: Hiroaki Anada (University of Nagasaki) | ||
* 5 Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings, Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi and Tatsuya Suzuki | * 5 Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings, Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi and Tatsuya Suzuki | ||
- | * 52 DroidCaps: Orientation-based Malware Analysis for Android through Capsule Networks, Mohammad Nauman, Sohail Khan and Toqeer Ali Syed | + | * (No-Show) 52 DroidCaps: Orientation-based Malware Analysis for Android through Capsule Networks, Mohammad Nauman, Sohail Khan and Toqeer Ali Syed |
* 64 A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation, Dang Duy Thang and Toshihiro Matsui | * 64 A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation, Dang Duy Thang and Toshihiro Matsui | ||