From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment., , , , , , и . IEEE Trans. Ind. Informatics, 18 (1): 467-476 (2022)DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things., , , , , , и . CoRR, (2020)C2FResMorph: A high-performance framework for unsupervised 2D medical image registration., , , , , , и . Pattern Recognit., (2024)An Attack Vector Evaluation Method for Smart City Security Protection., , и . WiMob, стр. 1-7. IEEE, (2019)Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT., , , , , и . DSC, стр. 1-8. IEEE, (2019)A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT., , , , , , и . IEEE Internet Things J., 8 (12): 10034-10046 (2021)A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall., , , , , и . Future Gener. Comput. Syst., (2023)DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption., , , , , и . CoRR, (2020)Diff-SFCT: A Diffusion Model with Spatial-Frequency Cross Transformer for Medical Image Segmentation., , , , , и . BIBM, стр. 1174-1181. IEEE, (2023)A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication., , , , и . Wirel. Commun. Mob. Comput., (2021)