From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes., , , , , и . IEEE Internet Things J., 4 (6): 1844-1852 (2017)Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy., , , , , и . WASA, том 10874 из Lecture Notes in Computer Science, стр. 425-437. Springer, (2018)Fog Computing Based Ultraviolet Radiation Measurement via Smartphones., , и . HotWeb, стр. 79-84. IEEE Computer Society, (2015)Information Acquisition in Desert Ant Navigation., , , и . Int. J. Inf. Acquis., 3 (1): 33-43 (2006)Privacy-preserving combinatorial auction without an auctioneer., , , , , и . EURASIP J. Wireless Comm. and Networking, (2018)FFRLI: Fast fault recovery scheme based on link importance for data plane in SDN., , , , и . Comput. Networks, (декабря 2023)Parametric Bootstrap Tests for Unbalanced Three-factor Nested Designs under Heteroscedasticity., , , , и . Communications in Statistics - Simulation and Computation, 45 (1): 322-338 (2016)Design and simulation of reverse-blocking Schottky-drain AlN/AlGaN HEMTs with drain field plate., , , , , , , , , и 4 other автор(ы). Sci. China Inf. Sci., (2022)Inference attacks based on neural networks in social networks., , , , и . HotWeb, стр. 10:1-10:6. ACM, (2017)Personal Information Inference in Social Networks., , , , и . PAC, стр. 196-197. IEEE, (2017)