From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Three-dimensional reconstruction of protein networks provides insight into human genetic disease., , , , , и . Nature biotechnology, 30 (2): 159--164 (15.02.2012)Utility-based bandwidth allocation algorithm for heterogeneous wireless network., , и . WCSP, стр. 1-6. IEEE, (2012)Social Engineering Attack-Defense Strategies Based on Reinforcement Learning., , , , и . Comput. Syst. Sci. Eng., 47 (2): 2153-2170 (2023)The Design of a Mobile Application MetaPlant., , , , , и . DTPI, стр. 1-4. IEEE, (2023)Adversarial Text Generation for Personality Privacy Protection., , , , и . DSIT, стр. 159-165. ACM, (2021)Detecting Spear-phishing Emails Based on Authentication., , , , и . ICCCS, стр. 450-456. IEEE, (2019)Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction., , , , и . ICDIS, стр. 220-227. IEEE, (2022)The Research of Platform-Based Product Configuration Model., , , , и . IFIP CAI, том 304 из IFIP Advances in Information and Communication Technology, стр. 89-96. Springer, (2009)CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification., , , , и . ICCCS, стр. 490-498. IEEE, (2021)Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution., , , , и . Secur. Commun. Networks, (2021)