From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep rank hashing network for cancellable face identification., , , , и . Pattern Recognit., (2022)On modeling system-centric information for role engineering., , , и . SACMAT, стр. 169-178. ACM, (2003)A Role Administration System in Role-based Authorization Infrastructures - Design and Implementation., , , и . SAC, стр. 325-330. ACM, (2003)Authentication and Authorization for Network Security Service., , и . Security and Management, стр. 84-88. CSREA Press, (2004)A Location Privacy Protection Mechanism for Smart Space., , , , , и . WISA, том 2908 из Lecture Notes in Computer Science, стр. 162-173. Springer, (2003)A Performance Comparison of Loss Functions., , , и . ICTC, стр. 1146-1151. IEEE, (2019)End-to-end Korean Digits Speech Recognition., , , и . ICTC, стр. 1137-1139. IEEE, (2019)A role-based infrastructure management system: design and implementation., , , и . Concurr. Pract. Exp., 16 (11): 1121-1141 (2004)A Cancellable Ranking Based Hashing Method for Fingerprint Template Protection., , , , , и . MONAMI, том 235 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 378-389. Springer, (2017)Lightweight Signature-based Range Proof., , и . ICTC, стр. 1862-1865. IEEE, (2022)