From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The store-and-flood distributed reflective denial of service attack., , , , , и . ICCCN, стр. 1-8. IEEE, (2014)Revisiting why Kad lookup fails., , , , , и . P2P, стр. 37-42. IEEE, (2012)Comparison of glass etching properties between HCl and HNO3 solution., , , , , , и . NEMS, стр. 562-566. IEEE, (2012)Extensity of C3S EBSD Database and Its Structure Calculation., , и . DBTA, стр. 1-4. IEEE, (2010)Phishing page detection via learning classifiers from page layout feature., , , , , , и . EURASIP J. Wireless Comm. and Networking, (2019)A Robust Algorithm for Multichannel Eeg Compressed Sensing with Mixed Noise., , и . GlobalSIP, стр. 1-5. IEEE, (2019)Modularized Morphing of Neural Networks., , и . CoRR, (2017)Logistic regression for imbalanced learning based on clustering., и . Int. J. Comput. Sci. Eng., 18 (1): 54-64 (2019)Towards Memory Safe Enclave Programming with Rust-SGX., , , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 2333-2350. ACM, (2019)Dimensional Stability Ground Test and in-Orbit Prediction of SiC Telescope Frame for Space Gravitational Wave Detection., , , , и . IEEE Access, (2022)