From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints., , , , , , и . Inf. Sci., (2021)A Deep End-to-End Model for Transient Stability Assessment With PMU Data., , , , , , и . IEEE Access, (2018)One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction., , , , , и . IEEE Trans. Reliab., 68 (4): 1404-1428 (2019)Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing., , , и . IEEE Access, (2019)A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain., , , и . J. Sens. Actuator Networks, 11 (4): 86 (2022)Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments., , , и . IEEE Trans. Smart Grid, 12 (2): 1541-1551 (2021)Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders., , , , , и . IEEE Trans. Smart Grid, 10 (4): 4401-4410 (2019)An automated framework for evaluating open-source web scanner vulnerability severity., , , , и . Serv. Oriented Comput. Appl., 14 (4): 297-307 (2020)A Taxonomic Review of Adaptive Random Testing: Current Status, Classifications, and Issues., , , и . CoRR, (2019)BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network., , , , , и . J. Syst. Softw., (октября 2023)