From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets., , , , и . IJDSN, (2017)Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise., , , и . Quantum Inf. Process., 13 (1): 101-112 (2014)Comment on Lee et al.'s group signature and e-auction scheme., , , , , и . Inf. Syst. Frontiers, 15 (1): 133-139 (2013)An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem., , , и . J. Medical Syst., 39 (3): 32 (2015)K-M Sequence is Forwardly Predictable.. AUSCRYPT, том 453 из Lecture Notes in Computer Science, стр. 37-38. Springer, (1990)Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network., , , , и . Sensors, 20 (5): 1264 (2020)An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography., , , и . Multim. Tools Appl., 76 (2): 1801-1815 (2017)Adaptive synchronization of memristor-based BAM neural networks with mixed delays., , , и . Appl. Math. Comput., (2018)Data clustering using bacterial foraging optimization., , , , и . J. Intell. Inf. Syst., 38 (2): 321-341 (2012)Particle swarm optimizer with two differential mutation., , , , , и . Appl. Soft Comput., (2017)