From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Attack on SMC-Based Software Protection., , и . ICICS, том 4307 из Lecture Notes in Computer Science, стр. 352-368. Springer, (2006)2FA Communication Protocol to Secure Metro Control Devices., , , , и . ITSC, стр. 1019-1024. IEEE, (2019)Identification of Faulty Links in LEO/MEO Satellite Communication Networks., , и . ICECCS, стр. 394-400. IEEE Computer Society, (2005)Data Quality-Oriented Data Integration in Peer-to-Peer System.. HIS (2), стр. 419-422. IEEE Computer Society, (2009)A Memory Optimization Method for Distributed Training., , , , и . ICONIP (7), том 1961 из Communications in Computer and Information Science, стр. 383-395. Springer, (2023)A Deep Learning Pipeline Parallel Optimization Method., , , , и . CCGrid, стр. 240-248. IEEE, (2023)Collusion attack to a scalable AND-ACC fingerprinting scheme., и . VCIP, том 6508 из SPIE Proceedings, стр. 65082X. SPIE, (2007)A Novel Separable Model and Decomposition Method for Sensor Locational Decision Problem., , , и . IJDSN, (2014)Blocking Foxy Phishing Emails with Historical Information., , , и . ICC, стр. 1-5. IEEE, (2010)Lightweight Key Management Protocols for Smart Grids., , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 345-348. IEEE, (2016)