From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack., , , , , , и . IEEE Access, (2018)PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments., , , , и . IEEE Access, (2018)CSFL: A novel unsupervised convolution neural network approach for visual pattern classification., , , и . AI Commun., 30 (5): 311-324 (2017)An Improved dynamic functional connectivity and deep neural network model for Autism Spectrum Disorder Classification., , , и . ICDLT, стр. 37-41. ACM, (2022)SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network., , , , и . IEEE Access, (2018)A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems., , , , , и . IEEE Access, (2018)Facebook5k: A Novel Evaluation Resource Dataset for Cross-Media Search., , , и . ICCCS (1), том 11063 из Lecture Notes in Computer Science, стр. 512-524. Springer, (2018)A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval., , , и . IEEE Access, (2018)FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network., , , , , и . IEEE Access, (2018)A fine-grained access control and revocation scheme on clouds., , и . Concurr. Comput. Pract. Exp., 28 (6): 1697-1714 (2016)