From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Information and Resource Sharing in Cloud., , и . CODASPY, стр. 131-133. ACM, (2015)Use of Multicast across Inter-domain Peering Points., , , , и . RFC, (января 2018)A Comparison of Linear and Mesh Topologies - DQDB and the Manhattan Street Network., и . IEEE J. Sel. Areas Commun., 11 (8): 1278-1289 (1993)Rate-based control schemes for ABR traffic - Design principles and performance comparison.. Computer Networks and ISBN Systems, 29 (5): 583-593 (1997)Attribute Based Administration of Role Based Access Control : A Detail Description., и . CoRR, (2017)LTE signal classification and center frequency detection without Priori information., , , и . DySPAN, стр. 299-304. IEEE, (2012)A conceptual framework for Group-Centric secure information sharing., , , и . AsiaCCS, стр. 384-387. ACM, (2009)Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data., и . SKM, том 1549 из Communications in Computer and Information Science, стр. 130-148. Springer, (2021)Learnable Image Transformations for Privacy Enhanced Deep Neural Networks., и . TPS-ISA, стр. 64-73. IEEE, (2023)Toward a framework for detecting privacy policy violations in android application code., , , , , , , и . ICSE, стр. 25-36. ACM, (2016)