From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks., , , , , и . ESORICS (4), том 14347 из Lecture Notes in Computer Science, стр. 23-43. Springer, (2023)Sleeping Schedule-Aware Minimum Latency Broadcast in Wireless Ad Hoc Networks., , , , и . ICC, стр. 1-5. IEEE, (2009)On Handoff Minimization in Wireless Networks: From a Navigation Perspective., , , , , и . WCNC, стр. 1-6. IEEE, (2010)A Location-free Prediction-based Sleep Scheduling Protocol for Object Tracking in Sensor Networks., , , , , и . ICNP, стр. 63-72. IEEE Computer Society, (2009)Secure localization and location verification in wireless sensor networks., , , и . MASS, стр. 864-869. IEEE Computer Society, (2009)SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks., , , , и . MASS, стр. 1054-1059. IEEE Computer Society, (2009)ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems., , , , и . IMIS, стр. 100-105. IEEE Computer Society, (2011)Transparent Accelerator Migration in a Virtualized GPU Environment., , , , , , , , , и . CCGRID, стр. 124-131. IEEE Computer Society, (2012)Secure localization and location verification in wireless sensor networks: a survey, , , , и . The Journal of Supercomputing, 64 (3): 685-701 (июня 2013)Distributed Low Redundancy Broadcast for Uncoordinated Duty-Cycled WANETs., , , , и . GLOBECOM, стр. 1-5. IEEE, (2011)