From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , и . CoRR, (2020)Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption., , , , и . IEEE Trans. Inf. Forensics Secur., 8 (3): 553-562 (2013)PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry., , , , , и . IFIP Networking, стр. 1-9. IEEE, (2022)Efficiently Managing Large-Scale Keys in HDFS., , , , и . HPCC/DSS/SmartCity/DependSys, стр. 353-360. IEEE, (2021)SRAM: A State-Aware Risk Assessment Model for Intrusion Response., , , , , и . DSC, стр. 232-237. IEEE Computer Society, (2017)Cyberspace-Oriented Access Control: Model and Policies., , , , , и . DSC, стр. 261-266. IEEE Computer Society, (2017)Extensible Command Parsing Method for Network Device., , , и . CISIS, стр. 462-467. IEEE Computer Society, (2016)Privacy-preserving strategies in service quality aware Location-Based Services., , , и . ICC, стр. 7328-7334. IEEE, (2015)Impact factor-based group recommendation scheme with privacy preservation in MSNs., , , , , и . ICC, стр. 1-6. IEEE, (2017)Enhanced Architecture of TPM., , , и . ICYCS, стр. 1532-1537. IEEE Computer Society, (2008)