From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification., , , и . KSII Trans. Internet Inf. Syst., 16 (8): 2507-2528 (2022)Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , и . IEEE Trans. Inf. Forensics Secur., (2021)HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors., , , , и . ICICS (1), том 12918 из Lecture Notes in Computer Science, стр. 136-152. Springer, (2021)A Survey of Security Network Coding toward Various Attacks., , , , и . TrustCom, стр. 252-259. IEEE Computer Society, (2014)Charge-Depleting of the Batteries Makes Smartphones Recognizable., , , и . ICPADS, стр. 33-40. IEEE Computer Society, (2017)Model-agnostic adversarial example detection via high-frequency amplification., , , , , , и . Comput. Secur., (2024)Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs., , , , , и . NSS, том 7873 из Lecture Notes in Computer Science, стр. 590-598. Springer, (2013)In-Network Historical Data Storage and Query Processing Based on Distributed Indexing Techniques in Wireless Sensor Networks., , , и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 264-273. Springer, (2009)Redactable Blockchain From Decentralized Chameleon Hash Functions., , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2022)EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices., , , , , и . CCS, стр. 2931-2945. ACM, (2022)