From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reversible data hiding with contrast enhancement and tamper localization for medical images., , , , , и . Inf. Sci., (2017)Data-Driven System-Level Design Framework for Responsible Cyber-Physical-Social Systems., , , , и . Computer, 56 (4): 80-91 (апреля 2023)Efficient key management for publish/subscribe system in cloud scenarios., , , , , и . Int. J. High Perform. Comput. Netw., 9 (5/6): 489-498 (2016)Lightweight Data Storage Based on Secret Sharing for Cloud Data., , , , и . FCST, стр. 264-267. IEEE Computer Society, (2015)OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs., , , , и . CITS, стр. 234-238. IEEE, (2017)EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe., , , , и . KSII Trans. Internet Inf. Syst., 12 (12): 5877-5897 (2018)Efficient Identity-Based Generalized Ring Signcryption Scheme., , и . KSII Trans. Internet Inf. Syst., 10 (12): 5553-5571 (2016)Secure and Efficient Adjacency Search Supporting Synonym Query on Encrypted Graph in the Cloud., , , , и . IEEE Access, (2019)Tensor-Based Baum-Welch Algorithms in Coupled Hidden Markov Model for Responsible Activity Prediction., , , , , и . IEEE Trans. Comput. Soc. Syst., 10 (6): 2924-2937 (декабря 2023)Risk assessment of security systems based on entropy theory and the Neyman-Pearson criterion., , , , и . Reliab. Eng. Syst. Saf., (2015)