From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , и . CoRR, (2020)Discovering obscure looking glass sites on the web to facilitate internet measurement research., , , , , , и . CoNEXT, стр. 426-439. ACM, (2021)Inferring Attack Paths in Networks with Periodic Topology Changes., , , , , и . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, стр. 724-731. IEEE, (2022)Efficiently Constructing Topology of Dynamic Networks., , , , , и . TrustCom, стр. 44-51. IEEE, (2022)Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field., , , , и . SpaCCS Workshops, том 10658 из Lecture Notes in Computer Science, стр. 54-63. Springer, (2017)An improved attack on clock-controlled shift registers based on hardware implementation., , , и . Sci. China Inf. Sci., 56 (11): 1-10 (2013)Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks., , , , и . GLOBECOM, стр. 1-6. IEEE, (2017)Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption., , , , и . IEEE Trans. Inf. Forensics Secur., 8 (3): 553-562 (2013)PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry., , , , , и . IFIP Networking, стр. 1-9. IEEE, (2022)Efficiently Managing Large-Scale Keys in HDFS., , , , и . HPCC/DSS/SmartCity/DependSys, стр. 353-360. IEEE, (2021)