Harashta Tatimma Larasati

Orcid: 0000-0001-6143-4134

According to our database1, Harashta Tatimma Larasati authored at least 23 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DEMIX: Domain-Enforced Memory Isolation for Embedded System.
Sensors, April, 2023

Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2023

Quantum Circuit Designs of Point Doubling for Binary Elliptic Curves.
CoRR, 2023

Simple Sentiment Analysis Ansatz for Sentiment Classification in Quantum Natural Language Processing.
IEEE Access, 2023

Quantum-Enhanced Support Vector Machine for Sentiment Classification.
IEEE Access, 2023

Space and Time-Efficient Quantum Multiplier in Post Quantum Cryptography Era.
IEEE Access, 2023

Depth-Optimization of Quantum Cryptanalysis on Binary Elliptic Curves.
IEEE Access, 2023

Depth Optimization of FLT-Based Quantum Inversion Circuit.
IEEE Access, 2023

A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain.
Proceedings of the Information Security Applications - 24th International Conference, 2023

ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Another Concrete Quantum Cryptanalysis of Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2022

Reducing the Depth of Quantum FLT-Based Inversion Circuit.
IACR Cryptol. ePrint Arch., 2022

High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA.
IACR Cryptol. ePrint Arch., 2022

Quantum Representation for Sentiment Classification.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

DTA: Physical Camouflage Attacks using Differentiable Transformation Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Quantum Federated Learning: Remarks and Challenges.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

A Secure Federated Learning Framework using Blockchain and Differential Privacy.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

2021
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches.
Sensors, 2021

Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

2020
A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Sensors, 2020

Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.
Proceedings of the Information Security Applications - 21st International Conference, 2020

ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Proceedings of the CCSW'20, 2020

2018
Performance Comparison of Named Data and IP-based Network - Case Study on the Indonesia Higher Education Network.
J. Commun., 2018


  Loading...