From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability Evaluating Based on Attack Graph., , , и . ISCTCS, том 320 из Communications in Computer and Information Science, стр. 555-563. Springer, (2012)A Novel Comprehensive Network Security Assessment Approach., , , и . ICC, стр. 1-6. IEEE, (2011)A Bayesian regularized neural network approach to short-term traffic speed prediction., , , и . SMC, стр. 2215-2220. IEEE, (2011)Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification., , , и . DSC, стр. 181-188. IEEE, (2023)Model Checking for Microarchitectural Data Sampling Security., , , , , и . DSC, стр. 56-63. IEEE, (2022)TH_Cloudkey: Fast, Secure and Lowcost Backup System for Using Public Cloud Storage., , , и . CSC, стр. 36-41. IEEE Computer Society, (2013)A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis., , , и . Applied Artificial Intelligence, 28 (6): 555-576 (2014)An Ant Colony Optimization based Approach to Adjust Public Transportation Network., , и . CEC, стр. 2575-2580. IEEE, (2019)Computation Error Analysis of Block Floating Point Arithmetic Oriented Convolution Neural Network Accelerator Design., , , и . CoRR, (2017)RFID enabled vehicular wireless query for Travel Information in Intelligent Transportation System., , и . RFID-TA, стр. 415-420. IEEE, (2011)