From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control Model Based on Role and Attribute and Its Implementation., , , , , и . CyberC, стр. 66-71. IEEE, (2016)Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform., , , и . CISP-BMEI, стр. 1-6. IEEE, (2017)A Distributed Cross-Realm Identification Scheme Based on Hyperchaos System., и . CSISE (2), том 105 из Advances in Intelligent and Soft Computing, стр. 147-152. Springer, (2011)Noise Suppression with Label Graph in Distantly Supervised Relation Extraction., , , , и . CSCWD, стр. 1143-1148. IEEE, (2022)Formal definition and analysis of access control model based on role and attribute., , и . J. Inf. Secur. Appl., (2018)Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion., , , , и . IEEE Access, (2020)A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform., , и . J. Inf. Secur. Appl., (2022)Heuristic Map Tiles Prefetch Strategy Based on Road Network Analysis., , и . ISCID (2), стр. 321-325. IEEE, (2017)Image encryption algorithm based on bit-level permutation and "Feistel-like network" diffusion., , и . Multim. Tools Appl., 81 (30): 44335-44362 (2022)An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map., , , , и . Entropy, 24 (7): 901 (2022)