From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Correlating processes for automatic memory evidence analysis., , , , , и . INFOCOM Workshops, стр. 115-120. IEEE, (2015)Matrix partition-based detection scheme for false data injection in smart grid., , и . Int. J. Wirel. Mob. Comput., 9 (3): 250-256 (2015)Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid., , , , и . IJDSN, (2014)A Textual Adversarial Attack Scheme for Domain-Specific Models., , , , и . ML4CS (2), том 13656 из Lecture Notes in Computer Science, стр. 104-117. Springer, (2022)Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data., , , , , и . ICC, стр. 1-6. IEEE, (2019)Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach., , , , и . Concurr. Comput. Pract. Exp., (2019)The Permission Delegation Mechanism for P2P Network., , , и . FGCN (2), стр. 303-308. IEEE Computer Society, (2007)Verification Code Recognition Based on Active and Deep Learning., , , , , , и . CoRR, (2019)A Multi-Feature Based Automatic Approach to Geospatial Record Linking., , , , , , , и . Int. J. Semantic Web Inf. Syst., 14 (4): 73-91 (2018)An Efficient and Privacy-Preserving Energy Trading Scheme Based on Blockchain., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)