From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions., , , , , и . IEEE Access, (2020)A super-resolution method for low-quality face image through RBF-PLS regression and neighbor embedding., , , , и . ICASSP, стр. 1253-1256. IEEE, (2012)Dynamic Privacy Leakage Analysis of Android Third-Party Libraries., , и . ICDIS, стр. 275-280. IEEE, (2018)Dynamic Stacked Generalization for Node Classification on Networks., и . CoRR, (2016)Noise Face Image Hallucination via Data-Driven Local Eigentransformation., , , , , и . PCM, том 8879 из Lecture Notes in Computer Science, стр. 183-192. Springer, (2014)Develop Secure Database System with Security Extended ER Model., , , и . KES (3), том 3683 из Lecture Notes in Computer Science, стр. 1005-1010. Springer, (2005)Global Face Super Resolution and Contour Region Constraints., , , , и . ISNN (2), том 6064 из Lecture Notes in Computer Science, стр. 120-127. Springer, (2010)Distributed Adaptive Formation Tracking Control of Mobile Robots With Event-Triggered Communication and Denial-of-Service Attacks., , , и . IEEE Trans. Ind. Electron., 70 (4): 4077-4087 (2023)Ankle Ligament Injuries Based on Medical Images of Hip-Hop Training and Research on Training Techniques., и . J. Sensors, (2021)The Formal Model of DBMS Enforcing Multiple Security Polices., , , и . J. Softw., 5 (5): 514-521 (2010)