From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Self-Attention-Based Approach for Named Entity Recognition in Cybersecurity., , и . CIS, стр. 147-150. IEEE, (2019)LUBM: A benchmark for OWL knowledge base systems., , и . J. Web Semant., 3 (2-3): 158-182 (2005)Highly efficient federated learning with strong privacy preservation in cloud computing., , , и . Comput. Secur., (2020)Rapid Benchmarking for Semantic Web Knowledge Base Systems., , , и . ISWC, том 3729 из Lecture Notes in Computer Science, стр. 758-772. Springer, (2005)On Logical Consequence for Collections of OWL Documents., и . ISWC, том 3729 из Lecture Notes in Computer Science, стр. 338-352. Springer, (2005)A TNC Protocol for 3GPP-WLAN Integrated Environment., и . ICICA (2), том 308 из Communications in Computer and Information Science, стр. 651-657. Springer, (2012)Prediction of ship roll motion based on combination of phase space reconstruction theory and Elman network., , , , и . ICIA, стр. 686-689. IEEE, (2016)Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration., , и . EURASIP J. Wirel. Commun. Netw., (2010)An Insider Threat Detection Method Based on Business Process Mining., , , , и . Int. J. Bus. Data Commun. Netw., 13 (2): 83-98 (2017)Privacy-preserving and communication-efficient federated learning in Internet of Things., , , , , и . Comput. Secur., (2021)