From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing Mutual Authentication Protocols in Industrial Wireless Network., , , и . ICDIS, стр. 153-158. IEEE, (2018)Usage Control in Conditional Access System with malicious Set-top Box., , и . Security and Management, стр. 201-205. CSREA Press, (2009)GraphextQA: A Benchmark for Evaluating Graph-Enhanced Large Language Models., , , , и . CoRR, (2023)Optimized Java Card transaction mechanism based on object locality., , и . SAC, стр. 550-551. ACM, (2010)A Stepwise Frontal Face Synthesis Approach for Large Pose Non-frontal Facial Image., , , , и . PCM (2), том 9917 из Lecture Notes in Computer Science, стр. 439-448. Springer, (2016)Local Eyebrow Feature Attention Network for Masked Face Recognition., , , , и . ACM Trans. Multim. Comput. Commun. Appl., 19 (3): 114:1-114:19 (2023)Distributed Adaptive Resilient Formation Control of Uncertain Nonholonomic Mobile Robots Under Deception Attacks., , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (9): 3822-3835 (2021)Implicit space pose consistent transfer network for deep face verification., , , , и . Pattern Recognit. Lett., (декабря 2023)Noise Robust Face Hallucination via Locality-Constrained Representation., , , и . IEEE Trans. Multim., 16 (5): 1268-1281 (2014)AGTGAN: Unpaired Image Translation for Photographic Ancient Character Generation., , , , , , , , , и . ACM Multimedia, стр. 5456-5467. ACM, (2022)