From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device., , , , , , , и . IEEE Access, (2018)Improved Path Planning for Indoor Patrol Robot Based on Deep Reinforcement Learning., , , , и . Symmetry, 14 (1): 132 (2022)The influence of achievement goals on online help seeking of computer science students., , , и . Br. J. Educ. Technol., 48 (6): 1273-1283 (2017)Quantifying the effects of active learning environments: separating physical learning classrooms from pedagogical approaches, , и . Learning Environments Research, (апреля 2021)A Note on Dependence of Epidemic Threshold on State Transition Diagram in the SEIC Cybersecurity Dynamical System Model., и . SciSec, том 11287 из Lecture Notes in Computer Science, стр. 51-64. Springer, (2018)From one tree to a forest: a unified solution for structured web data extraction., , , и . SIGIR, стр. 775-784. ACM, (2011)Automatic Identification of Ineffective Online Student Questions in Computing Education., , , , и . FIE, стр. 1-5. IEEE, (2018)Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm., , , , , , , и . ICCE, стр. 1-5. IEEE, (2019)Sparse anchoring guided high-resolution capsule network for geospatial object detection from remote sensing imagery., , , , , , , и . Int. J. Appl. Earth Obs. Geoinformation, (2021)In Situ Identification of Student Self-Regulated Learning Struggles in Programming Assignments., , , , , и . SIGCSE, стр. 467-473. ACM, (2021)