From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient maintenance for maximal bicliques in bipartite graph streams., , , , , и . World Wide Web, 25 (2): 857-877 (2022)Policy-Customized: A New Abstraction for Building Security as a Service., , , , и . ISPAN-FCST-ISCC, стр. 203-210. IEEE Computer Society, (2017)Attentional Fused Temporal Transformation Network for Video Action Recognition., , , , , , , , и . ICASSP, стр. 4377-4381. IEEE, (2020)Enhanced Visual Loop Closing for Laser-Based SLAM., , и . ASAP, стр. 1-4. IEEE Computer Society, (2018)Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention., , , , и . ICDF2C, том 441 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 248-264. Springer, (2021)Developing a trustworthy computing framework for clouds., , , , и . Int. J. Embed. Syst., 8 (1): 59-68 (2016)Research on Linux Trusted Boot Method Based on Reverse Integrity Verification., , , , , и . Sci. Program., (2016)Loop Detection and Correction of 3D Laser-Based SLAM with Visual Information., , , и . CASA, стр. 53-58. ACM, (2018)Cloud-Oriented SAT Solver Based on Obfuscating CNF Formula., , , и . APWeb Workshophs, том 8710 из Lecture Notes in Computer Science, стр. 188-199. Springer, (2014)Efficient Training Techniques for Multi-Agent Reinforcement Learning in Combat Tasks., , , и . IEEE Access, (2019)