Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2021 | Adversarial Imaging Pipelines | Phan, Buu; Mannan, Fahim; Heide, Felix |
13-Jul-2022 | A survey on computational spectral reconstruction methods from RGB to hyperspectral imaging | Zhang, Jingang; Su, Runmu; Fu, Qiang; Ren, Wenqi; Heide, Felix, et al |
Oct-2017 | A verified messaging system | Mansky, William; Appel, Andrew W; Nogin, Aleksey |
1-Jan-2021 | SimCSE: Simple Contrastive Learning of Sentence Embeddings | Gao, T; Yao, X; Chen, Danqi |
2020 | Indifferentiability for Public Key Cryptosystems | Zhandry, Mark; Zhang, Cong |
Jan-2016 | Example-directed synthesis: a type-theoretic interpretation | Frankle, Jonathan; Osera, Peter-Michael; Walker, David; Zdancewic, Steve |
2017 | Bioinformatics Approaches to Profile the Tumor Microenvironment for Immunotherapeutic Discovery | Clancy, Trevor; Dannenfelser, Ruth; Troyanskaya, Olga; Malmberg, Karl J; Hovig, Eivind, et al |
2017 | Breaking the Sub-Exponential Barrier in Obfustopia | Garg, Sanjam; Pandey, Omkant; Srinivasan, Akshayaram; Zhandry, Mark |
2016 | Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | Nishimaki, Ryo; Wichs, Daniel; Zhandry, Mark |
Sep-2016 | Deletion Without Rebalancing in Binary Search Trees | Sen, Siddhartha; Tarjan, Robert E; Kim, David H K |