From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wiretap Channel with Information Embedding on Actions., и . Entropy, 16 (4): 2105-2130 (2014)Artificial Noise Generated in MIMO Scenario: Optimal Power Design., , , , , и . IEEE Signal Process. Lett., 20 (10): 964-967 (2013)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., и . ICC, стр. 1-5. IEEE, (2010)Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , и . ISCID (1), стр. 43-48. IEEE, (2017)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , и . IWQoS, стр. 1-10. IEEE, (2022)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , и . ICC, стр. 2688-2693. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , и . AAAI, стр. 5420-5427. AAAI Press, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , и . TrustCom, стр. 97-103. IEEE, (2020)Localization of multiple jamming attackers in vehicular ad hoc network., , , , и . Int. J. Distributed Sens. Networks, (2017)Intelligent intrusion detection based on federated learning aided long short-term memory., , , и . Phys. Commun., (2020)