From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem., , , и . Signal Process. Image Commun., 29 (8): 914-920 (2014)Design and Analysis on a Parallel Chaos-Based Hash Function., , , и . Int. J. Bifurc. Chaos, 30 (13): 2050188:1-2050188:18 (2020)A differentially private matrix factorization based on vector perturbation for recommender system., , , и . Neurocomputing, (2022)Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources., , , , и . IEEE Trans. Syst. Man Cybern. Syst., 53 (10): 6220-6231 (октября 2023)M-to-N Backdoor Paradigm: A Stealthy and Fuzzy Attack to Deep Learning Models., , , и . CoRR, (2022)Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models., , , и . CoRR, (2023)Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation., , , и . Int. J. Bifurc. Chaos, (2013)Exploiting the Security Aspects of Compressive Sampling., , , , и . Secur. Commun. Networks, (2018)Providing prediction reliability through deep neural networks for recommender systems., , , , и . Comput. Ind. Eng., (ноября 2023)PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data., , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (2): 961-974 (марта 2024)