From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SWCA: a secure weighted clustering algorithm in wireless ad hoc networks., , , , и . WCNC, стр. 2426-2431. IEEE, (2009)A study on association rule mining of darknet big data., , , , , и . IJCNN, стр. 1-7. IEEE, (2015)A multi-layer memory sharing network for video captioning., , , , , , и . Pattern Recognit., (апреля 2023)Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs., , и . J. Ambient Intell. Humaniz. Comput., 7 (5): 681-692 (2016)Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling., , , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 637-654. Springer, (2016)Deep Packet Inspection with Delayed Signature Matching in Network Auditing., и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 75-91. Springer, (2018)Fine-Grained Hashing With Double Filtering., , , , и . IEEE Trans. Image Process., (2022)TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing., , , , и . ICICS (1), том 12918 из Lecture Notes in Computer Science, стр. 260-275. Springer, (2021)Supervised cross-modal hashing without relaxation., , , , , и . ICME, стр. 1159-1164. IEEE Computer Society, (2017)SRConfig: An Empirical Method of Interdependent Soft Configurations for Improving Performance in n-Tier Application., , , , и . SCC, стр. 601-608. IEEE Computer Society, (2016)