From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A secure-coding and vulnerability check system based on smart-fuzzing and exploit., и . Neurocomputing, (2017)Guest Editorial: Technologies and Applications for Interactive NUX/NUI., , , и . Multimedia Tools Appl., 75 (23): 15151-15156 (2016)SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook., , и . Appl. Soft Comput., (2018)Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks., , и . STA, том 186 из Communications in Computer and Information Science, стр. 157-163. Springer, (2011)Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data., , и . Symmetry, 9 (1): 1 (2017)Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World., , и . Symmetry, 8 (10): 106 (2016)On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems., , и . ICHIT, том 4413 из Lecture Notes in Computer Science, стр. 596-606. Springer, (2006)IS 2007 PC Co-chairs' Message., , , и . OTM Conferences (2), том 4804 из Lecture Notes in Computer Science, стр. 1527. Springer, (2007)Design and analysis of a self-tuning feedback controller for the Internet., , , , и . Comput. Networks, 53 (11): 1784-1797 (2009)Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval., , , и . Inf. Fusion, 12 (3): 223-230 (2011)