From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ASA: Against statistical attacks for privacy-aware users in Location Based Service., , , , и . Future Gener. Comput. Syst., (2017)Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model., , , и . IEEE Trans. Ind. Informatics, 16 (9): 6154-6162 (2020)Floor of log: a novel intelligent algorithm for 3D lung segmentation in computer tomography images., , , , , и . Multim. Syst., 28 (4): 1151-1163 (2022)TIMCC: On Data Freshness in Privacy-Preserving Incentive Mechanism Design for Continuous Crowdsensing Using Reverse Auction., , , , , и . IEEE Access, (2020)Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach., , , и . IEEE Access, (2020)Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA., , , , и . IEEE Access, (2020)A lightweight machine learning-based authentication framework for smart IoT devices., , , , , и . Inf. Sci., (2019)CredFinder: A real-time tweets credibility assessing system., , , , и . ASONAM, стр. 1406-1409. IEEE Computer Society, (2016)A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing., , , и . FGIT-GDC, том 63 из Communications in Computer and Information Science, стр. 57-64. Springer, (2009)iRobot-Factory: An intelligent robot factory based on cognitive manufacturing and edge computing., , , , и . Future Gener. Comput. Syst., (2019)