From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage., , , , и . IEEE Trans. Inf. Forensics Secur., 14 (2): 331-346 (2019)Reliable Bulk-Data Dissemination in Delay Tolerant Networks., , и . IEEE Trans. Parallel Distributed Syst., 25 (8): 2180-2189 (2014)An Efficient Privacy-Preserving Ranked Keyword Search Method., , , , , , и . IEEE Trans. Parallel Distributed Syst., 27 (4): 951-963 (2016)Privacy-preserving big data analytics a comprehensive survey., и . J. Parallel Distributed Comput., (2019)Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks., , и . IEEE Trans. Computers, 64 (6): 1670-1679 (2015)A Robust Policy Bootstrapping Algorithm for Multi-objective Reinforcement Learning in Non-stationary Environments., , и . CoRR, (2023)A survey of network anomaly detection techniques., , и . J. Netw. Comput. Appl., (2016)A pixel-based scrambling scheme for digital medical images protection., и . J. Netw. Comput. Appl., 32 (4): 788-794 (2009)An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems., , , , и . IEEE Trans. Sustain. Comput., 6 (1): 66-79 (2021)A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection., , , и . IEEE Netw., 23 (1): 42-47 (2009)