From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visibility Computations - Scanline Algorithms and Techniques.. ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 25-37. Springer, (2007)A Longitudinal Study of Google Play., , и . IEEE Trans. Comput. Social Systems, 4 (3): 135-149 (2017)Feasibility of 5G mm-wave communication for connected autonomous vehicles., , , и . CoRR, (2018)Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles., , , и . CoRR, (2020)Fraud De-Anonymization for Fun and Profit., , , и . ACM Conference on Computer and Communications Security, стр. 115-130. ACM, (2018)Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience., , , и . CoRR, (2024)Leveraging Public Cloud Infrastructure for Real-time Connected Vehicle Speed Advisory at a Signalized Corridor., , , , , и . CoRR, (2024)A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles., , , и . CoRR, (2021)Lessons Learned from the Real-world Deployment of a Connected Vehicle Testbed., , , , , , и . CoRR, (2017)CQSumDP: A ChatGPT-Annotated Resource for Query-Focused Abstractive Summarization Based on Debatepedia., , , , и . CoRR, (2023)