From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The limitations for expression recognition in computer vision introduced by facial masks., , , , и . Multim. Tools Appl., 82 (8): 11305-11319 (марта 2023)Malicious Short URLs Detection Technique., , , и . RoEduNet, стр. 1-6. IEEE, (2023)NextEDR - Next Generation Agent-Based EDR Systems for Cybersecurity Threats., , , , , , и . PDP, стр. 183-190. IEEE, (2024)Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks., , , и . ICTSS, том 12543 из Lecture Notes in Computer Science, стр. 135-149. Springer, (2020)Using Spatial Indexing Systems to Optimize Emergency Response Routes., , , и . CSCS, стр. 544-550. IEEE, (2023)TrustS: Probability-based trust management system in smart cities., , , и . ISPDC, стр. 65-69. IEEE, (2022)Teaching Big Data: Lessons Learned., , , , и . CSCS, стр. 641-646. IEEE, (2023)TSPeer - Trust model for spherical Peer-to-Peer overlay networks., , , , , и . CSCS, стр. 81-85. IEEE, (2023)CPSOCKS: Cross-Platform Privacy Overlay Adapter Based on SOCKSv5 Protocol., , , , и . GPC, том 13744 из Lecture Notes in Computer Science, стр. 149-161. Springer, (2022)Hiding cloud network access patterns for enhanced privacy., , , , и . RoEduNet, стр. 1-5. IEEE, (2022)