-
1
Detecting Composite Functional Module in miRNA Regulation and mRNA Interaction Network
Published 2017-12-01Subjects: Get full text
Article -
2
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers
Published 2016-08-01Subjects: Get full text
Article -
3
The Eigensharp Property for Unit Graphs Associated with Some Finite Rings
Published 2022-07-01Subjects: Get full text
Article -
4
Partitioning the vertex set of a bipartite graph into complete bipartite subgraphs
Published 2014-09-01Subjects: “…bicliques…”
Get full text
Article -
5
Efficient Approximation for Restricted Biclique Cover Problems
Published 2018-06-01Subjects: “…biclique cover…”
Get full text
Article -
6
Unbalanced Biclique Cryptanalysis of Full-Round GIFT
Published 2019-01-01Subjects: Get full text
Article -
7
Scale Reduction Techniques for Computing Maximum Induced Bicliques
Published 2017-10-01Subjects: “…maximum biclique…”
Get full text
Article -
8
Inapproximability of Maximum Biclique Problems, Minimum k-Cut and Densest At-Least-k-Subgraph from the Small Set Expansion Hypothesis
Published 2018-01-01Subjects: Get full text
Article -
9
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01Subjects: Get full text
Article -
10
Biclique cryptanalysis on lightweight block ciphers I-PRESENT-80 and I-PRESENT-128
Published 2017-11-01Subjects: “…lightweight block cipher;PRESENT;matching-with-precomputations;biclique cryptanalysis…”
Get full text
Article -
11
Biclique: an R package for maximal biclique enumeration in bipartite graphs
Published 2020-02-01Subjects: “…Biclique…”
Get full text
Article -
12
Algorithm for Mining Maximal Balanced Bicliques Using Formal Concept Analysis
Published 2025-01-01Subjects: Get full text
Article -
13
Polyhedral Characteristics of Balanced and Unbalanced Bipartite Subgraph Problems
Published 2017-04-01Subjects: “…biclique…”
Get full text
Article -
14
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: “…SM3 hash function;preimage attack;pseudo-collision attack;differential meet-in-the-middle;biclique…”
Get full text
Article -
15
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: Get full text
Article -
16
Analysis of biclusters with applications to gene expression data
Published 2005-01-01Subjects: “…biclique…”
Get full text
Article