From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat., , , , и . CyberC, стр. 81-89. IEEE, (2019)Enhancing heterogeneous similarity estimation via neighborhood reversibility., , , , и . Multimedia Tools Appl., 77 (1): 1437-1452 (2018)Multi-scale image fusion through rolling guidance filter., , , , и . Future Gener. Comput. Syst., (2018)Blind sequence detection using reservoir computing., , , , , , , и . Digit. Signal Process., (2017)Optimal PPVO-based reversible data hiding., , , и . J. Vis. Commun. Image Represent., (2017)Introduction to the special issue on deep learning for real-time information hiding and forensics., , , и . J. Real-Time Image Processing, 17 (1): 1-5 (2020)An Invocation Cost Optimization Method for Web Services in Cloud Environment., , и . Sci. Program., (2017)A solution for cyclic scheduling of multi-hoists without overlapping., и . Ann. Oper. Res., 168 (1): 5-21 (2009)A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography., , , , и . CoRR, (2024)Real-World Image Super Resolution via Unsupervised Bi-directional Cycle Domain Transfer Learning based Generative Adversarial Network., , , , , , и . CoRR, (2022)