From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique., , , , , и . Inf. Sci., (2015)Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest., , , и . Entropy, 18 (2): 45 (2016)A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model"., , , и . ICCCS (1), том 10039 из Lecture Notes in Computer Science, стр. 335-342. (2016)A Trend Filtering Based Prediction Model on Network Traffic., и . ICNC-FSKD, том 1075 из Advances in Intelligent Systems and Computing, стр. 874-882. Springer, (2019)Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid., , , , , и . ICSAI, стр. 161-165. IEEE, (2018)Secure Cloud Storage Model Based on TPKE and ECE., и . J. Inf. Hiding Multim. Signal Process., 9 (6): 1549-1558 (2018)Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things., , , , и . IEEE Access, (2020)Prediction of annual precipitation based on fuzzy and grey Markov process., , , , и . ICMLC, стр. 1136-1140. IEEE, (2010)An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect., , , , , и . Sensors, 17 (12): 2911 (2017)FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair., , , и . CoRR, (2022)