From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme., и . Mob. Networks Appl., 22 (2): 209-215 (2017)Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo., , и . CCIS, стр. 61-64. IEEE, (2012)Energy Modeling of IoT Mobile Terminals on WiFi Environmental Impacts., , , и . Sensors, 18 (6): 1728 (2018)Analyzing and Disentangling Interleaved Interrupt-Driven IoT Programs., , , и . IEEE Internet Things J., 6 (3): 5376-5386 (2019)Question answering model based on machine reading comprehension with knowledge enhancement and answer verification., , и . Concurr. Comput. Pract. Exp., (2022)Analyzing and Disentangling Interleaved Interrupt-driven IoT Programs., , , и . CoRR, (2018)Semantic Navigation of Keyword Search Based on Knowledge Graph., , , , и . ChineseCSCW, стр. 189-192. ACM, (2017)Stochastic gradient identification for Hammerstein systems with non-uniformly sampling., , , , и . Comput. Syst. Sci. Eng., (2016)Generation of Adversarial Malware Based on Genetic Algorithm and Instruction Replacement., , , , и . CNIOT, стр. 936-942. ACM, (2023)Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones., , и . CollaborateCom, том 252 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 88-97. Springer, (2017)