Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Limits of preprocessing

    Filmus, Y., Ishai, Y., Kaplan, A. & Kindler, G., 1 Jul 2020, 35th Computational Complexity Conference, CCC 2020. Saraf, S. (ed.). 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 169).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications

    Druk, E. & Ishai, Y., 2014, ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science. p. 169-182 14 p. (ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Lossy chains and fractional secret sharing

    Ishai, Y., Kushilevitz, E. & Strulovich, O., 2013, 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013. p. 160-171 12 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 20).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Low-complexity cryptographic hash functions

    Applebaum, B., Haramaty-Krasne, N., Ishai, Y., Kushilevitz, E. & Vaikuntanathan, V., 1 Nov 2017, 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. Papadimitriou, C. H. (ed.). (Leibniz International Proceedings in Informatics, LIPIcs; vol. 67).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Making the best of a leaky situation: Zero-knowledge PCPs from leakage-resilient circuits

    Ishai, Y., Weiss, M. & Yang, G., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings

    Applebaum, B., Ishai, Y., Kushilevitz, E. & Eyal, K., 1 Jan 2018, In: Journal of Cryptology. 31, 1, p. 1-22

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN

    Dao, Q., Ishai, Y., Jain, A. & Lin, H., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). p. 315-348 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Near-optimal secret sharing and error correcting codes in AC0

    Cheng, K., Ishai, Y. & Li, X., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). p. 424-458 35 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Non-interactive and non-malleable commitment

    Di Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 141-150 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    101 Scopus citations
  • Non-Interactive Multiparty Computation Without Correlated Randomness

    Halevi, S., Ishai, Y., Jain, A., Komargodski, I., Sahai, A. & Yogev, E., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 181-211 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    21 Scopus citations
  • Non-interactive secure multiparty computation

    Beimel, A., Gabizon, A., Ishai, Y., Kushilevitz, E., Meldgaard, S. & Paskin-Cherniavsky, A., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. p. 387-404 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    52 Scopus citations
  • Oblivious Transfer with Constant Computational Overhead

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). p. 271-302 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On 2-round secure multiparty computation

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). p. 178-193 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • On achieving the "best of both worlds" in secure multiparty computation

    Ishai, Y., Katz, J., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 1, p. 122-141 20 p.

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations
  • On adaptive vs. Non-adaptive security of multiparty protocols

    Canetti, R., Damgaard, I., Dziembowski, S., Ishai, Y. & Malkin, T., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). p. 262-279 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • On complete primitives for fairness

    Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R. & Sahai, A., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 91-108 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • On computational shortcuts for information-theoretic PIR

    Hong, M. M., Ishai, Y., Kolobov, V. I. & Lai, R. W. F., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 504-534 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On efficient zero-knowledge PCPs

    Ishai, Y., Mahmoody, M. & Sahai, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 151-168 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • One-Message Secure Reductions: On the Cost of Converting Correlations

    Ishai, Y., Kelkar, M., Narayanan, V. & Zafar, L., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 515-547 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • One-way functions are essential for single-server private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Malkin, T., 1999, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 89-98 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    32 Scopus citations
  • On invertible sampling and adaptive security

    Ishai, Y., Kumarasubramanian, A., Orlandi, C. & Sahai, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 466-482 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2013, Computing and Combinatorics - 19th International Conference, COCOON 2013, Proceedings. p. 169-181 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7936 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • On linear-size pseudorandom generators and hardcore functions

    Baron, J., Ishai, Y. & Ostrovsky, R., 2014, In: Theoretical Computer Science. 554, C, p. 50-63 14 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., 2007, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 10th International Workshop, APPROX 2007 and 11th International Workshop, RANDOM 2007, Proceedings. p. 311-325 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4627 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • On locally decodable codes, self-correctable codes, and t-private PIR

    Barkol, O., Ishai, Y. & Weinreb, E., Dec 2010, In: Algorithmica (New York). 58, 4, p. 831-859 29 p.

    Research output: Contribution to journalArticlepeer-review

    10 Scopus citations
  • On Low-End Obfuscation and Learning

    Boyle, E., Ishai, Y., Meyer, P., Robere, R. & Yehuda, G., 1 Jan 2023, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023. Kalai, Y. T. (ed.). 23. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • On privacy and partition arguments

    Chor, B. & Ishai, Y., 25 May 2001, In: Information and Computation. 167, 1, p. 2-9 8 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    9 Scopus citations
  • On pseudorandom encodings

    Agrikola, T., Couteau, G., Ishai, Y., Jarecki, S. & Sahai, A., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). p. 639-669 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., Apr 2008, In: Computational Complexity. 17, 1, p. 38-69 32 p.

    Research output: Contribution to journalArticlepeer-review

    40 Scopus citations
  • On pseudorandom generators with linear stretch in NC0

    Applebaum, B., Ishai, Y. & Kushilevitz, E., 2006, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 a. p. 260-271 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On public key encryption from noisy codewords

    Ben-Sasson, E., Ben-Tov, I., Damgård, I., Ishai, Y. & Ron-Zewi, N., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C-M., Chung, K-M., Yang, B-Y. & Persiano, G. (eds.). p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • On succinct arguments and witness encryption from groups

    Barta, O., Ishai, Y., Ostrovsky, R. & Wu, D. J., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). p. 776-806 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On the complexity of decomposable randomized encodings, or: How friendly can a garbling-friendly PRF be?

    Ball, M., Holmgren, J., Ishai, Y., Liu, T. & Malkin, T., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 86. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On the complexity of UC commitments

    Garay, J. A., Ishai, Y., Kumaresan, R. & Wee, H., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 677-694 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • On the cryptographic complexity of the worst functions

    Beimel, A., Ishai, Y., Kumaresan, R. & Kushilevitz, E., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. p. 317-342 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    51 Scopus citations
  • On the hardness of information-theoretic multiparty computation

    Ishai, Y. & Kushilevitz, E., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). p. 439-455 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    30 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., Apr 2021, In: Journal of Cryptology. 34, 2, 10.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations
  • On the Local Leakage Resilience of Linear Secret Sharing Schemes

    Benhamouda, F., Degwekar, A., Ishai, Y. & Rabin, T., 2018, ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I. Boldyreva, A. & Shacham, H. (eds.). Vol. 10991. p. 531-561 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    28 Scopus citations
  • On the message complexity of secure multiparty computation

    Ishai, Y., Mittal, M. & Ostrovsky, R., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). p. 698-711 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • On the power of correlated randomness in secure computation

    Ishai, Y., Kushilevitz, E., Meldgaard, S., Orlandi, C. & Paskin-Cherniavsky, A., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 600-620 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    63 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2001, In: Proceedings of the Annual IEEE Conference on Computational Complexity. p. 188-202 15 p.

    Research output: Contribution to journalConference articlepeer-review

    33 Scopus citations
  • On the power of nonlinear secret-sharing

    Beimel, A. & Ishai, Y., 2005, In: SIAM Journal on Discrete Mathematics. 19, 1, p. 258-280 23 p.

    Research output: Contribution to journalArticlepeer-review

    20 Scopus citations
  • On the randomness complexity of efficient sampling

    Dubrov, B. & Ishai, Y., 2006, STOC'06: Proceedings of the 38th Annual ACM Symposium on Theory of Computing. p. 711-720 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Optimizing obfuscation: Avoiding Barrington's theorem

    Ananth, P., Gupta, D., Ishai, Y. & Sahai, A., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. p. 646-658 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    61 Scopus citations
  • OT-combiners via secure computation

    Harnik, D., Ishai, Y., Kushilevitz, E. & Nielsen, J. B., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 393-411 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • Parallel hashing via list recoverability

    Haitner, I., Ishai, Y., Omri, E. & Shaltiel, R., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • Partial garbling schemes and their applications

    Ishai, Y. & Wee, H., 2014, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Proceedings. PART 1 ed. p. 650-662 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8572 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Perfect constant-round secure computation via perfect randomizing polynomials

    Ishai, Y. & Kushilevitz, E., 2002, Automata, Languages and Programming - 29th International Colloquium, ICALP 2002, Proceedings. Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R. & Hennessy, M. (eds.). p. 244-256 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    116 Scopus citations
  • Perfectly secure multiparty computation and the computational overhead of cryptography

    Damgård, I., Ishai, Y. & Krøigaard, M., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 445-465 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    123 Scopus citations
  • Perfect MPC over Layered Graphs

    David, B., Deligios, G., Goel, A., Ishai, Y., Konring, A., Kushilevitz, E., Liu-Zhang, C. D. & Narayanan, V., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). p. 360-392 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review