From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Information Hiding Using 3D-Printing Technology., , , , , и . IDAACS, стр. 701-706. IEEE, (2019)Hiding data in vector images: software implementation and experimental research., , и . Multim. Tools Appl., 82 (10): 14581-14607 (апреля 2023)Techniques for Raising the Remainder to a Power in the System of Residual Classes., , , , и . DESSERT, стр. 145-150. IEEE, (2020)Multiple Axis-Aligned Filters for Rendering of Combined Distribution Effects., , , и . Comput. Graph. Forum, 36 (4): 155-166 (2017)Photon-Driven Neural Reconstruction for Path Guiding., , , , , , , и . ACM Trans. Graph., 41 (1): 7:1-7:15 (2022)Extrapolation to calculate the probability of a double spending attack., , , и . CMIS, том 2608 из CEUR Workshop Proceedings, стр. 610-620. CEUR-WS.org, (2020)The data errors control in the modular number system based on the nullification procedure., , , и . CMIS, том 2608 из CEUR Workshop Proceedings, стр. 580-593. CEUR-WS.org, (2020)New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences., , , и . ICTERI Workshops, том 2732 из CEUR Workshop Proceedings, стр. 214-227. CEUR-WS.org, (2020)Convolutional Neural Networks to Protect Against Spoofing Attacks on Biometric Face Authentication., , и . PLAIS, том 429 из Lecture Notes in Business Information Processing, стр. 123-146. Springer, (2021)Particle Swarm Optimization based on S-Boxes Generation., , , и . CPITS II (2), том 3188 из CEUR Workshop Proceedings, стр. 120-134. CEUR-WS.org, (2021)