From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network., , , , и . Int. J. Wirel. Inf. Networks, 27 (4): 503-517 (2020)A brief review and challenges of object detection in optical remote sensing imagery., , , , и . Multiagent Grid Syst., 16 (3): 227-243 (2020)Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group., , , и . Int. J. Netw. Secur., 22 (2): 314-320 (2020)Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems., , , , и . Int. J. Netw. Secur., 22 (3): 484-489 (2020)GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system., и . Evol. Intell., 14 (4): 1817-1829 (2021)Facial expression recognition based on convolutional block attention module and multi-feature fusion., и . Int. J. Comput. Vis. Robotics, 13 (1): 21-37 (2023)Research on the online parameter identification method of train driving dynamic model., , , , и . Int. J. Comput. Vis. Robotics, 13 (5): 497-509 (2023)An Improved Discrete Firefly Algorithm Used for Traveling Salesman Problem., , и . ICSI (1), том 10385 из Lecture Notes in Computer Science, стр. 593-600. Springer, (2017)Ad Hoc Networks in Healthcare Intelligent Transportation Systems Humanitary Relief – MANETs, VANETs, and FANETs, , , , , , , , , и 1 other автор(ы). стр. 66–89. CRC Press, (июля 2023)A Proxy Re-Encryption Scheme Based on Elliptic Curve Group., , , и . J. Inf. Hiding Multim. Signal Process., 8 (1): 218-227 (2017)