From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scheduling Real-Time Security Aware Tasks in Fog Networks., , , , и . IEEE Trans. Serv. Comput., 14 (6): 1981-1994 (2021)Data Abstraction and Visualisation in Next Step: Experiences from a Government Services Delivery Trial., , и . BigData Congress, стр. 263-270. IEEE Computer Society, (2013)Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm., , , и . IEEE Access, (2021)DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream., , , и . ACM Trans. Embed. Comput. Syst., 16 (2): 51:1-51:24 (2017)Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection., , , , , , и . CoRR, (2023)HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios., , , и . CoRR, (2020)Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT., , , , , и . IEEE Trans. Sustain. Comput., 8 (1): 32-42 (января 2023)Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013., , , , и . EAI Endorsed Trans. Collab. Comput., 1 (1): e2 (2014)On the Neural Backdoor of Federated Generative Models in Edge Computing., , , , , и . ACM Trans. Internet Techn., 22 (2): 43:1-43:21 (2022)Internet of Things (IoT): Smart and Secure Service Delivery., , , и . ACM Trans. Internet Techn., 16 (4): 22:1-22:7 (2016)