From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Investigation of Data Privacy and Utility Preservation using KNN Classification as a Gauge., и . CoRR, (2013)Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation., , , , , , , , , и . ITiCSE-WGR, стр. 1-14. ACM, (2013)Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security Competition., , и . BigDataSE, стр. 57-64. IEEE, (2020)Towards A Differential Privacy and Utility Preserving Machine Learning Classifier., , и . Complex Adaptive Systems, том 12 из Procedia Computer Science, стр. 176-181. Elsevier, (2012)A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Using Machine Learning Classification as a Gauge., и . Complex Adaptive Systems, том 20 из Procedia Computer Science, стр. 414-419. Elsevier, (2013)Efficiency in Computing Correlation Matrix of Wavelet Coefficients by Exploiting Index Structure.. CSC, стр. 193-197. CSREA Press, (2010)A Wavelet Packet and Mel-Frequency Cepstral Coefficients-Based Feature Extraction Method for Speaker Identification., и . Complex Adaptive Systems, том 61 из Procedia Computer Science, стр. 416-421. Elsevier, (2015)Homomorphic Encryption., , и . Complex Adaptive Systems, том 20 из Procedia Computer Science, стр. 502-509. Elsevier, (2013)Visualization Tools for Network Security., , , и . Visualization and Data Analysis, стр. 1-8. Society for Imaging Science and Technology, (2016)The Treasury Bill Rate, the Great Recession, and Neural Networks Estimates of Real Business Sales., , и . Complex Adaptive Systems, том 36 из Procedia Computer Science, стр. 227-233. Elsevier, (2014)