From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting query privacy with differentially private k-anonymity in location-based services., , , , , и . Pers. Ubiquitous Comput., 22 (3): 453-469 (2018)Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems., , , , и . Secur. Commun. Networks, (2018)Remaining Useful Life Prediction Model for Rolling Bearings Based on MFPE-MACNN., , , , и . Entropy, 24 (7): 905 (2022)IM-IAD: Industrial Image Anomaly Detection Benchmark in Manufacturing., , , , , , , и . CoRR, (2023)Indexing multi-dimensional data in a cloud system., , , , и . SIGMOD Conference, стр. 591-602. ACM, (2010)SoftPatch: Unsupervised Anomaly Detection with Noisy Data., , , , , , , и . NeurIPS, (2022)Speaker Recognition Using Features Derived from Fractional Fourier Transform., и . AutoID, стр. 95-100. IEEE Computer Society, (2005)Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services., , , , , и . IIKI, том 129 из Procedia Computer Science, стр. 298-304. Elsevier, (2017)Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query., , , , и . WASA, том 10874 из Lecture Notes in Computer Science, стр. 720-732. Springer, (2018)Ad Hoc Aggregation Query Processing Algorithms Based on Bit-Store in Data Intensive Cloud., , , и . CyberC, стр. 313-320. IEEE Computer Society, (2011)