From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Method to Improve Security and Imperceptibility of Image Steganography., , и . FCS, том 1286 из Communications in Computer and Information Science, стр. 611-627. Springer, (2020)Malbert: A novel pre-training method for malware detection., , и . Comput. Secur., (2021)STP-Model: A semi-supervised framework with self-supervised learning capabilities for downhole fault diagnosis in sucker rod pumping systems., , , , , , и . Eng. Appl. Artif. Intell., (2024)Simulation of e-commerce diffusion model based on Netlogo., , и . ICCC, стр. 99-102. ACM, (2011)Heuristic algorithms for reliability estimation based on breadth-first search of a grid tree., , , и . Reliab. Eng. Syst. Saf., (апреля 2023)GNP-WGAN: Generative Nonlocal A Priori Augmented Wasserstein Generative Adversarial Networks for Seismic Data Reconstruction., , , , и . IEEE Trans. Geosci. Remote. Sens., (2024)Zero-Cost, Fine-Grained Power Monitoring of Datacenters Using Non-Intrusive Power Disaggregation., , , , и . Middleware, стр. 271-282. ACM, (2015)Integrating Semantic Zoning Information with the Prediction of Road Link Speed Based on Taxi GPS Data., , , , и . Complex., (2020)Demystifying the energy efficiency of Network Function Virtualization., , , и . IWQoS, стр. 1-10. IEEE, (2016)OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network., , , , и . CoRR, (2024)