From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception., , , , и . CoRR, (2022)Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm, , , , и . Chaos, Solitons & Fractals, 41 (5): 2613--2616 (2009)Cryptanalysis of a discrete-time synchronous chaotic encryption system, , , , и . Physics Letters A, 372 (7): 1034--1039 (2008)Cryptanalysis of a family of self-synchronizing chaotic stream ciphers, , , и . Communications in Nonlinear Science and Numerical Simulation, 16 (2): 805--813 (2011)From data flows to privacy-benefit trade-offs: A user-centric semantic model., и . Secur. Priv., (2022)Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review., , и . CoRR, (2022)On Iterated Numerical Integration., , и . International Conference on Computational Science (1), том 3514 из Lecture Notes in Computer Science, стр. 123-130. Springer, (2005)PSV (Password Security Visualizer): From Password Checking to User Education., , и . HCI (22), том 10292 из Lecture Notes in Computer Science, стр. 191-211. Springer, (2017)Proof of Swarm Based Ensemble Learning for Federated Learning Applications., , , и . SAC, стр. 152-155. ACM, (2023)Behind the Mask: A Computational Study of Anonymous' Presence on Twitter., , и . ICWSM, стр. 327-338. AAAI Press, (2020)