From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chain-based big data access control infrastructure., , , , , , , , , и . J. Supercomput., 74 (10): 4945-4964 (2018)Point Cloud Adversarial Perturbation Generation for Adversarial Attacks., , , и . IEEE Access, (2023)Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing., , , , , , и . IEEE Internet Things J., 11 (5): 8401-8413 (2024)Hybrid Deep Neural Network-Based Cross-Modal Image and Text Retrieval Method for Large-Scale Data., , , , , и . J. Circuits Syst. Comput., 30 (1): 2150018:1-2150018:15 (2021)Knowledge Distillation for Lightweight 2D Single-Person Pose Estimation., , , , и . J. Circuits Syst. Comput., 32 (3): 2350050:1-2350050:16 (февраля 2023)Point-PC: Point Cloud Completion Guided by Prior Knowledge via Causal Inference., , , , , , и . CoRR, (2023)T2TD: Text-3D Generation Model based on Prior Knowledge Guidance., , , , и . CoRR, (2023)HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis., , , , , , и . Secur. Commun. Networks, (2021)Achieving Secure Dynamic Searchable Symmetric Encryption for Data Sharing Services via Blockchain., , , и . CAIBDA, стр. 1-6. VDE / IEEE, (2022)Modeling Attack Process of Advanced Persistent Threat., , , , и . SpaCCS, том 10066 из Lecture Notes in Computer Science, стр. 383-391. (2016)