From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical identity-based encryption in multiple private key generator (PKG) environments., , , и . Secur. Commun. Networks, 8 (1): 43-50 (2015)SpikeCLIP: A Contrastive Language-Image Pretrained Spiking Neural Network., , , , , , , и . CoRR, (2023)Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care., , , , , и . J. Medical Syst., 38 (9): 91 (2014)Real-Time RGB-D Pedestrian Tracking for Mobile Robot., , , , и . ROBIO, стр. 1-6. IEEE, (2023)Evaluation of TDM-based Integrated Access and Backhaul Schemes for 5G and Beyond at mmWave Band., , , , , и . CyberC, стр. 348-353. IEEE, (2020)A network attack forensic platform against HTTP evasive behavior., , , , , и . J. Supercomput., 73 (7): 3053-3064 (2017)Monitoring of Xch4 Changes and Anomaly in Hebei Province, China Based on Tropomi., , , , , , , , и . IGARSS, стр. 2107-2108. IEEE, (2023)Promoting Data and Model Privacy in Federated Learning through Quantized LoRA., , , , , , , , , и . CoRR, (2024)Multi-animal 3D social pose estimation, identification and behaviour embedding with a few-shot learning framework., , , , , , , , , и 9 other автор(ы). Nat. Mac. Intell., 6 (1): 48-61 (2024)Proof of retrievability with flexible designated verification for cloud storage., , , , и . Comput. Secur., (декабря 2023)