Showing
1 - 5
results of
5
for search '
Jang JW
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Jang JW
Showing
1 - 5
results of
5
for search '
Jang JW
'
, query time: 0.06s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Efficient and privacy-preserving group signature for federated learning
by
Choi, B.J
,
Jang
,
J.W
,
Kanchan, S.
,
Yoon, J.Y
Published 2023
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
2
Detection of cognitive impairment using a machine-learning algorithm
by
Youn YC
,
Choi SH
,
Shin HW
,
Kim KW
,
Jang
JW
,
Jung JJ
,
Hsiung GY
,
Kim SY
Published 2018-11-01
Get full text
Article
3
Detection of cognitive impairment using a machine-learning algorithm [Corrigendum]
by
Youn YC
,
Choi SH
,
Shin HW
,
Kim KW
,
Jang
JW
,
Jung JJ
,
Hsiung GY
,
Kim SY
Published 2019-05-01
Get full text
Article
4
11C-PIB PET imaging reveals that amyloid deposition in cases with early-onset Alzheimer’s disease in the absence of known mutations retains higher levels of PIB in the basal...
by
Youn YC
,
Jang
JW
,
Han SH
,
Kim HR
,
Seok JW
,
Byun JS
,
Park KY
,
An SSA
,
Chun IK
,
Kim SY
Published 2017-06-01
Get full text
Article
5
Use of transient elastography to predict de novo recurrence after radiofrequency ablation for hepatocellular carcinoma
by
Lee SH
,
Kim SU
,
Jang
JW
,
Bae SH
,
Lee SH
,
Kim BK
,
Park JY
,
Kim DY
,
Ahn SH
,
Han KH
Published 2015-02-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Adversarial server
Authentication
Communication cost
Computation costs
Computer aided instruction
Efficiency
Federated learning
Group signature
Group signatures
Iterative methods
Machine learning techniques
Network security
Privacy preservation
Privacy preserving
Privacy-preserving techniques
User data
User devices
Loading...