From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards desirable decision boundary by Moderate-Margin Adversarial Training., , , , , , и . Pattern Recognit. Lett., (сентября 2023)An Approach for Crowd Density and Crowd Size Estimation., , , , и . J. Softw., 9 (3): 757-762 (2014)A multi-channel multi-tower GNN model for job transfer prediction based on academic social network., , , , и . Appl. Soft Comput., (2023)Traffic matrix estimation: A neural network approach with extended input and expectation maximization iteration., , , и . J. Netw. Comput. Appl., (2016)Wireless big data in cellular networks: the cornerstone of smart cities., , , , и . IET Commun., 12 (13): 1517-1523 (2018)EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks., , , , , , , и . ACM Trans. Priv. Secur., 25 (3): 23:1-23:24 (2022)A Practical Black-Box Attack on Source Code Authorship Identification Classifiers., , , и . IEEE Trans. Inf. Forensics Secur., (2021)A feature selection approach for hyperspectral image based on modified ant lion optimizer., , , , и . Knowl. Based Syst., (2019)A New Method For Text Location in News Video Based on Ant Colony Algorithm., , , , и . J. Comput., 9 (5): 1090-1095 (2014)Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks., , и . IEEE Commun. Lett., 25 (5): 1564-1567 (2021)