From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Overview of Cyber Threat Intelligence Description., , , , , и . ATCI (1), том 1398 из Advances in Intelligent Systems and Computing, стр. 343-350. Springer, (2021)Predicting Affective States of Programming Using Keyboard Data and Mouse Behaviors., , и . ICARCV, стр. 1408-1413. IEEE, (2018)Research on Flying Catkins Detection and Removal in Target Video., , , и . CSPS, том 571 из Lecture Notes in Electrical Engineering, стр. 848-857. Springer, (2019)Learning State-Specific Action Masks for Reinforcement Learning., , , , , и . Algorithms, 17 (2): 60 (2024)Image Denoising Algorithm Based on Gradient Domain Guided Filtering and NSST., , , и . IEEE Access, (2023)