Harashta Tatimma Larasati
Orcid: 0000-0001-6143-4134
According to our database1,
Harashta Tatimma Larasati
authored at least 23 papers
between 2018 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
Simple Sentiment Analysis Ansatz for Sentiment Classification in Quantum Natural Language Processing.
IEEE Access, 2023
IEEE Access, 2023
IEEE Access, 2023
IEEE Access, 2023
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain.
Proceedings of the Information Security Applications - 24th International Conference, 2023
ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
2021
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches.
Sensors, 2021
High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA.
Sensors, 2021
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.
Proceedings of the Information Security Applications - 22nd International Conference, 2021
2020
A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Sensors, 2020
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.
Proceedings of the Information Security Applications - 21st International Conference, 2020
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Proceedings of the CCSW'20, 2020
2018
Performance Comparison of Named Data and IP-based Network - Case Study on the Indonesia Higher Education Network.
J. Commun., 2018