From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data., , , , , и . CoRR, (2018)Adaptive cell relay routing protocol for mobile ad hoc networks., и . IEEE Trans. Veh. Technol., 55 (1): 278-285 (2006)CAMA: Class activation mapping disruptive attack for deep neural networks., , , , и . Neurocomputing, (2022)Biometric-based authentication scheme for Implantable Medical Devices during emergency situations., , , , и . Future Gener. Comput. Syst., (2019)Self-protecting networking using dynamic p-cycle construction within link capacity constraint., , , и . Secur. Commun. Networks, 5 (6): 689-708 (2012)AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application., , , , и . ICC, стр. 1-6. IEEE, (2017)Multi-layer security scheme for implantable medical devices., , , , , , и . Neural Comput. Appl., 32 (9): 4347-4360 (2020)Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation., , , , , , и . IEEE Internet Things J., 8 (12): 9905-9919 (2021)MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain., , , , , и . IEEE Access, (2017)PPLS: a privacy-preserving location-sharing scheme in mobile online social networks., , , , , , и . Sci. China Inf. Sci., (2020)