From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

User Association, Subchannel and Power Allocation in Space-Air-Ground Integrated Vehicular Network With Delay Constraints., , , , и . IEEE Trans. Netw. Sci. Eng., 10 (3): 1203-1213 (мая 2023)Energy-Efficient Subchannel Matching and Power Allocation in NOMA Autonomous Driving Vehicular Networks., , , , и . IEEE Wirel. Commun., 26 (4): 88-93 (2019)BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning., , и . CoRR, (2021)BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning., , и . SP, стр. 2043-2059. IEEE, (2022)Prompt Injection Attacks and Defenses in LLM-Integrated Applications., , , , и . CoRR, (2023)Fog Computing Vehicular Network Resource Management Based on Chemical Reaction Optimization., , , , и . IEEE Trans. Veh. Technol., 70 (2): 1770-1781 (2021)Deep Reinforcement Learning for Interference Suppression in RIS-Aided High-Speed Railway Networks., , , и . ICC Workshops, стр. 337-342. IEEE, (2022)PORE: Provably Robust Recommender Systems against Data Poisoning Attacks., , , и . USENIX Security Symposium, стр. 1703-1720. USENIX Association, (2023)Security Analysis of Camera-LiDAR Semantic-Level Fusion Against Black-Box Attacks on Autonomous Vehicles., , и . CoRR, (2021)StolenEncoder: Stealing Pre-trained Encoders., , , и . CoRR, (2022)