From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment., , , , и . ACM Trans. Auton. Adapt. Syst., 8 (4): 21:1-21:18 (2014)Leveraging Frequency Domain Learning in 3D Vessel Segmentation., , , , , , и . CoRR, (2024)Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , и . CoRR, (2024)LLM-Enhanced User-Item Interactions: Leveraging Edge Information for Optimized Recommendations., , , , и . CoRR, (2024)Bidirectional colorless WDM-PON RoF system with large spurious free dynamic range., , , , , , , и . JOCN, 14 (5): 389-397 (2022)Roving bugnet: Distributed surveillance threat and mitigation., и . Comput. Secur., 29 (5): 592-602 (2010)Identifying Linear Traces of the Han Dynasty Great Wall in Dunhuang Using Gaofen-1 Satellite Remote Sensing Imagery and the Hough Transform., , , , , , , и . Remote. Sens., 11 (22): 2711 (2019)Auto-Extraction of Linear Archaeological Traces of Tuntian Irrigation Canals in Miran Site (China) from Gaofen-1 Satellite Imagery., , , , , , , , и . Remote. Sens., 10 (5): 718 (2018)Ecological Efficiency Measurement and Technical Heterogeneity Analysis in China: A Two-Stage Three-Level Meta-Frontier Network Model Based on Segmented Projection., , и . Syst., 12 (1): 22 (2024)On the billing vulnerabilities of SIP-based VoIP systems., , , и . Comput. Networks, 54 (11): 1837-1847 (2010)