From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks., , , , , и . Mob. Inf. Syst., (2015)An approximation method of origin-destination flow traffic from link load counts., , , , , и . Comput. Electr. Eng., 37 (6): 1106-1121 (2011)GPU-Accelerated High-Throughput Online Stream Data Processing., , , , , и . IEEE Trans. Big Data, 4 (2): 191-202 (2018)Domain-Specific Chinese Word Segmentation Based on Bi-Directional Long-Short Term Memory Model., , , , , , и . IEEE Access, (2019)Geometric Searchable Encryption for Privacy-Preserving Location-Based Services., , , , и . IEEE Trans. Serv. Comput., 16 (4): 2672-2684 (июля 2023)An efficient algorithm for complete active space valence bond self-consistent field calculation., , , и . J. Comput. Chem., 34 (1): 38-48 (2013)Comments on FHH Anonymous Multireceiver Encryption., , , и . Int. J. Netw. Secur., 16 (5): 397-400 (2014)A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage., , , , и . Concurr. Comput. Pract. Exp., 28 (10): 2858-2876 (2016)How to Accelerate Capsule Convolutions in Capsule Networks., , , и . CoRR, (2021)Geometric Searchable Encryption Without False Positive And Its Applications., , , , и . Comput. J., 66 (9): 2155-2168 (сентября 2023)