From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks., , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 222-238. Springer, (2014)The evolution of argumentation mining: From models to social media and emerging tools., , , и . Inf. Process. Manag., (2019)IGFS: A New MAC Protocol Exploiting Heterogeneous Propagation Delays in the Dynamic Bandwidth Allocation on WDM-EPON., , , и . IEEE Syst. J., 4 (1): 49-56 (2010)A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems., , , , , и . IEEE Syst. J., 9 (3): 878-891 (2015)Fault-Tolerant SDN Solution for Cybersecurity Applications., , , , , , и . ARES, стр. 73:1-73:6. ACM, (2022)Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems., , , , , , и . ARES, стр. 52:1-52:8. ACM, (2023)Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks., , , , и . ARES, стр. 123:1-123:6. ACM, (2021)Intentional Islanding of Power Systems Through Self-Embedding Learning., , , , , , и . GLOBECOM (Workshops), стр. 1-6. IEEE, (2021)Ensuring fair downlink allocation in modern access networks: The XG-PON framework., , , и . SCVT, стр. 1-5. IEEE, (2013)Connectivity and coverage in machine-type communications., , , , , и . ICC, стр. 1-6. IEEE, (2017)