From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks., , , , , , , и . CoRR, (2019)A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol., , , и . J. Networks, 9 (10): 2622-2628 (2014)Power allocation algorithm based on mixed integer nonlinear programming in WSN., , и . Clust. Comput., 22 (Supplement): 4519-4525 (2019)EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles., , , , и . J. Syst. Archit., (2021)A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes., , , и . Int. J. Inf. Secur. Priv., 11 (1): 52-64 (2017)Hypergraph-Based Joint Channel and Power Resource Allocation for Cross-Cell M2M Communication in IIoT., , , , и . IEEE Internet Things J., 10 (17): 15350-15361 (сентября 2023)An outlier ensemble for unsupervised anomaly detection in honeypots data., , , и . Intell. Data Anal., 24 (4): 743-758 (2020)Lifetime-Driven Scheduling of Security-Critical Internet-of-Things Applications on Real-Time Heterogeneous Multicore Systems., , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 1466-1474. IEEE, (2021)Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2020)Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group., , и . ACSW, стр. 76:1-76:6. ACM, (2017)