From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT., , , , , и . Secur. Commun. Networks, (2017)A Novel Hybrid Information Security Scheme for 2D Vector Map., , , , , , и . Mob. Networks Appl., 23 (4): 734-742 (2018)Adversarial Defense Method Based on Latent Representation Guidance for Remote Sensing Image Scene Classification., , , , , , и . Entropy, 25 (9): 1306 (сентября 2023)Gradient-free adversarial attack algorithm based on differential evolution., , , , и . Int. J. Bio Inspired Comput., 22 (4): 217-226 (2023)Adversarial transformation network with adaptive perturbations for generating adversarial examples., , , , , , и . Int. J. Bio Inspired Comput., 20 (2): 94-103 (2022)Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification., , , и . Secur. Commun. Networks, (2021)A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication., , , , , , и . PCM (2), том 10736 из Lecture Notes in Computer Science, стр. 880-889. Springer, (2017)A multi-focus image fusion algorithm in 5G communications., , , , , , , и . Multimedia Tools Appl., 78 (20): 28537-28556 (2019)An intelligent method of cancer prediction based on mobile cloud computing., , , , , , и . Clust. Comput., 22 (5): 11527-11535 (2019)A data authentication scheme for UAV ad hoc network communication., , , , , , и . J. Supercomput., 76 (6): 4041-4056 (2020)