From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DeepICU: imbalanced classification by using deep neural networks for network intrusion detection., , , , и . Int. J. Big Data Intell., 7 (3): 137-147 (2020)Flat and hierarchical system deployment for edge computing systems., , , , и . Future Gener. Comput. Syst., (2020)PraDa: Privacy-preserving Data-Deduplication-as-a-Service., , и . CIKM, стр. 1559-1568. ACM, (2014)An SVM Based Secural Image Steganography Algorithm for IoT., , , , и . CSS (2), том 11983 из Lecture Notes in Computer Science, стр. 357-371. Springer, (2019)VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs., , и . IJCNN, стр. 1-8. IEEE, (2021)GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems., , , , , , , и . CoRR, (2016)Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm., , и . IEEE Trans. Serv. Comput., 9 (1): 18-32 (2016)Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey., , и . IEEE Trans. Knowl. Data Eng., 33 (4): 1601-1618 (2021)Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition., , , , и . CoRR, (2021)Anomalous Event Sequence Detection., , , , , , , и . IEEE Intell. Syst., 36 (3): 5-13 (2021)