Name
Affiliation
Papers
JOOS VANDEWALLE
Katholieke Universiteit Leuven ESAT-COSIC K. Mercierlaan 94 B-3001 Heverlee Belgium K. Mercierlaan 94 B-3001 Heverlee Belgium
163
Collaborators
Citations 
PageRank 
196
4420
523.42
Referers 
Referees 
References 
8228
1397
1083
Search Limit
1001000
Title
Citations
PageRank
Year
The crucial role of mathematics in circuits, systems and signal processing research and education00.342016
Developing engineering-oriented educational workshops within a student branch.00.342013
Reducing the Number of Support Vectors of SVM Classifiers Using the Smoothed Separable Case Approximation512.112012
Machine learning in side-channel analysis: a first study.512.192011
Hardware Implementation Of An Elliptic Curve Processor Over Gf(P) With Montgomery Modular Multiplier10.362008
Super-Resolution From Unregistered and Totally Aliased Signals Using Subspace Methods211.382007
Partial Synchronization In Oscillator Arrays With Asymmetric Coupling10.482007
Learning Of Spatiotemporal Behaviour In Cellular Neural Networks80.702006
Spectral characterization of cryptographic boolean functions satisfying the (extended) propagation criterion of degree l and order k10.352005
Special Section on Nonlinear Theory and its Applications00.342005
A Double Scroll Based True Random Bit Generator40.842004
A Comparison of Pruning Algorithms for Sparse Least Squares Support Vector Machines331.412004
Benchmarking Least Squares Support Vector Machine Classifiers24312.312004
Computation of the Canonical Decomposition by Means of a Simultaneous Generalized Schur Decomposition676.252004
Kernel PLS variants for regression40.572003
Revocable Anonymous Access To The Internet?120.932003
Cryptanalysis of 3-Pass HAVAL212.612003
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions514.112003
Cryptanalysis of SOBER-t3220.442003
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array291.942003
Hardware implementation of an elliptic curve processor over GF(p)452.382003
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher.20.382002
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem201.222002
Applying General Access Structure to Proactive Secret Sharing Schemes.100.892002
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure20.412002
Weighted least squares support vector machines: robustness and sparse approximation33120.802002
On Unconditionally Secure Distributed Oblivious Transfer110.672002
On a resynchronization weakness in a class of combiners with memory20.422002
Families Of Scroll Grid Attractors8122.892002
Bayesian Framework for Least-Squares Support Vector Machine Classifiers, Gaussian Processes, and Kernel Fisher Discriminant Analysis1129.292002
Secure Meeting Scheduling with agenTA30.492001
New (Two-Track-)MAC Based on the Two Trails of RIPEMD30.482001
Automatic relevance determination for Least Squares Support Vector Machines classifiers101.482001
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT90.962001
Improved long-term temperature prediction by chaining of neural networks.110.852001
Artificial Neural Networks in Hydrological Watershed Modeling: Surface Flow Contribution from the Ungauged Parts of a Catchment10.372001
Combining World Wide Web and Wireless Security111.472001
Optimal control by least squares support vector machines11110.742001
In Memoriam – Vitold Belevitch00.342000
Sparse approximation using least squares support vector machines865.822000
Chaos Synchronization: A Lagrange Programming Network Approach00.342000
On the Best Rank-1 and Rank-(R1,R2,. . .,RN) Approximation of Higher-Order Tensors21615.642000
A Multilinear Singular Value Decomposition116466.602000
An algebraic approach to the blind identification of paraunitary filters10.372000
The K.U.Leuven competition data: a challenge for advanced neural network techniques30.442000
CNN Algorithms for Video Authentication and Copyright Protection00.341999
A hybrid system for fraud detection in mobile communications50.591999
Multiclass least squares support vector machines538.941999
Improved generalization ability of neurocontrollers by imposing NLq stability constraints00.341998
Setting up a Secure Web Server and Clients on an Intranet10.391998
  • 1
  • 2