From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing and detecting resource leaks in Android applications., , , , и . ASE, стр. 389-398. IEEE, (2013)Detection of false data attacks in smart grid with supervised learning., , и . IJCNN, стр. 1395-1402. IEEE, (2016)Adapting to Unknown Noise Distribution in Matrix Denoising., , и . CoRR, (2018)Evaluating instruction cache vulnerability to transient errors., и . SIGARCH Comput. Archit. News, 35 (4): 21-28 (2007)Compiler-guided Register Reliability Improvement Against Soft Errors, и . Proceedings of the 5th ACM International Conference on Embedded software, стр. 203--209. (сентября 2005)A Toeplitz Covariance Matrix Reconstruction Approach for Direction-of-Arrival Estimation., , и . IEEE Trans. Veh. Technol., 66 (9): 8223-8237 (2017)Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids., , , , , и . IEEE Trans. Smart Grid, 11 (6): 5227-5238 (2020)Research on Investment Scale Calculation and Accurate Management of Power Grid Projects Based on Three-Level Strategy., , , , и . IEEE Access, (2021)An offer generation approach to SLA negotiation support in service oriented computing., , и . Serv. Oriented Comput. Appl., 4 (4): 277-289 (2010)Robust Implementation of Foreground Extraction and Vessel Segmentation for X-ray Coronary Angiography Image Sequence., , , и . CoRR, (2022)