From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain., , , и . Journal of Zhejiang University - Science C, 11 (5): 365-374 (2010)WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree., , , и . IEEE BigData, стр. 5691-5698. IEEE, (2021)An Improved Method for Reversible Data Hiding in Encrypted Image., и . ICA3PP (Workshops and Symposiums), том 9532 из Lecture Notes in Computer Science, стр. 24-34. Springer, (2015)Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack., , , , , и . Digit. Commun. Networks, 8 (3): 373-387 (2022)一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks)., , , и . 计算机科学, 43 (1): 172-177 (2016)Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks., , , и . Sensors, 19 (11): 2452 (2019)Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability., , , , и . IEEE Geosci. Remote. Sens. Lett., (2023)An Efficient Linguistic Steganography for Chinese Text., , , и . ICME, стр. 2094-2097. IEEE Computer Society, (2007)Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs., , , и . Comput. J., 67 (5): 1710-1718 (2024)Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk., , , , , , , и . Cybersecur., 6 (1): 46 (декабря 2023)