From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning., , , , и . ICECCS, стр. 31-40. IEEE, (2019)Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems., , , , и . IEICE Trans. Inf. Syst., 99-D (8): 2019-2026 (2016)Online-SVR for vehicular position prediction during GPS outages using low-cost INS., , , , и . PIMRC, стр. 1945-1950. IEEE, (2015)An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs., , , и . FSKD, стр. 763-767. IEEE, (2015)TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics., , , , , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 385-395. Springer, (2009)A multi-attribute rating based trust model: improving the personalized trust modeling framework., , , , , , , , и . Multimedia Tools Appl., 76 (4): 5833-5849 (2017)A sighting-aware obstacle mobility model for ad hoc network., , и . Int. J. Wirel. Mob. Comput., 6 (4): 375-383 (2013)A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning., , и . IEEE Access, (2020)A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model., , , , и . Int. J. Netw. Manag., (2018)An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models., , , , , и . IEEE Trans. Ind. Informatics, 16 (2): 1024-1034 (2020)