From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing., , , , и . CoRR, (2020)Efficient Privacy-Preserving Computation Based on Additive Secret Sharing., , , , и . CoRR, (2020)BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle., , , и . IEEE Trans. Veh. Technol., 70 (9): 8639-8652 (2021)RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust., , , , и . J. Inf. Secur. Appl., (2019)Unforgeability of an improved certificateless signature scheme in the standard model., , , , и . IET Inf. Secur., 8 (5): 273-276 (2014)Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields., , , , , и . IEEE Trans. Inf. Theory, 65 (10): 6819-6826 (2019)An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks., , , , , и . IEEE Trans. Vehicular Technology, 69 (5): 4689-4699 (2020)Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances., , и . CoRR, (2019)Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients., , , , , , и . CoRR, (2022)A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network., , , , и . CoRR, (2022)