Author of the publication

Security and privacy with K-step opacity for finite automata via a novel algebraic approach.

, , , and . Trans. Inst. Meas. Control, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-Series Data Imputation via Realistic Masking-Guided Tri-Attention Bi-GRU., , , , , , and . ECAI, volume 372 of Frontiers in Artificial Intelligence and Applications, page 3074-3082. IOS Press, (2023)Noisy Speech Recognition Based on Robust End-point Detection and Model Adaptation., and . ICASSP (1), page 441-444. IEEE, (2005)Tree-Structured Clustering Methods for Piecewise Linear-Transformation-Based Noise Adaptation., , and . IEICE Trans. Inf. Syst., 88-D (9): 2168-2176 (2005)Language-Enhanced Session-Based Recommendation with Decoupled Contrastive Learning., , , , , and . CoRR, (2023)Structured Knowledge Distillation Towards Efficient and Compact Multi-View 3D Detection., , , , , , and . CoRR, (2022)An Experimental Evaluation of SimRank-based Similarity Search Algorithms., , , and . Proc. VLDB Endow., 10 (5): 601-612 (2017)A boundary-guided transformer for measuring distance from rectal tumor to anal verge on magnetic resonance images., , , , , , , , and . Patterns, 4 (4): 100711 (April 2023)ASMEvoNAS: Adaptive segmented multi-objective evolutionary network architecture search., , , , , and . Appl. Soft Comput., (October 2023)Security and privacy with K-step opacity for finite automata via a novel algebraic approach., , , and . Trans. Inst. Meas. Control, (2021)Evolution of cooperation in the multigame on a two-layer square network., , , , , and . Appl. Math. Comput., (2021)