From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits., и . ICCCS, стр. 680-684. IEEE, (2020)Classification Model on Big Data in Medical Diagnosis Based on Semi-Supervised Learning., , , , , и . Comput. J., 65 (2): 177-191 (2022)TBench: A Collaborative Work Platform for Multilingual Terminology Editing and Development., , , , , , и . MedInfo, том 264 из Studies in Health Technology and Informatics, стр. 1449-1450. IOS Press, (2019)Speech Authentication and Recovery Scheme in Encrypted Domain., , , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 46-60. (2016)Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication., , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 129-144. (2016)Towards DDoS detection mechanisms in Software-Defined Networking., , , , , , и . J. Netw. Comput. Appl., (2021)Two-Level Schemata and Generalized Links for Hypertext Database Models., и . Future Databases, том 3 из Advanced Database Research and Development Series, стр. 231-239. World Scientific, Singapore, (1992)An efficient content authentication scheme in encrypted speech based on integer wavelet transform., , , и . APSIPA, стр. 1-8. IEEE, (2016)An efficient fingerprint identification algorithm based on minutiae and invariant moment., , , , и . Pers. Ubiquitous Comput., 22 (1): 71-80 (2018)Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm., , , , , и . Comput. Networks, (2022)