From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-party authenticated key exchange protocol using lattice-based cryptography., и . IACR Cryptology ePrint Archive, (2016)High-order graph matching based on ant colony optimization., , , и . Neurocomputing, (2019)Improved hill-climbing methods in the design of bijective S-boxes., , , , и . ICNC, стр. 2378-2380. IEEE, (2010)A Light-Weighted Convolutional Neural Network for Bitemporal SAR Image Change Detection., , , , , , и . CoRR, (2020)Lossy trapdoor functions based on the PLWE., , , и . Clust. Comput., 22 (Supplement): 5647-5654 (2019)Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment"., , , , , и . Inf. Sci., (2021)Classification and saliency detection by semi-supervised low-rank representation., , , , и . Pattern Recognit., (2016)New optimal constructions of conflict-avoiding codes of odd length and weight 3., , и . Des. Codes Cryptogr., 73 (3): 791-804 (2014)Evolutionary Multiform Optimization With Two-Stage Bidirectional Knowledge Transfer Strategy for Point Cloud Registration., , , , , , и . IEEE Trans. Evol. Comput., 28 (1): 62-76 (февраля 2024)Multi-Scale Image Block-Level F-CNN for Remote Sensing Images Object Detection., , , , , и . IEEE Access, (2019)