From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing., , , , и . J. Intell. Fuzzy Syst., 37 (4): 4531-4536 (2019)From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT., , , , и . Secur. Commun. Networks, (2021)Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN., , , , и . NaNA, стр. 271-276. IEEE, (2020)Petri net modeling and vulnerability analysis of the Heartbleed., , , , и . NaNA, стр. 155-160. IEEE, (2021)Track Irregularity Prediction Based on DWT-DLSTM Model., , , , , и . NaNA, стр. 1-5. IEEE, (2022)Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay., , , , и . NaNA, стр. 1-5. IEEE, (2022)Bayesian mechanism for rational secret sharing scheme., , , , , и . Sci. China Inf. Sci., 58 (5): 1-13 (2015)Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model., , , , , и . EUC, стр. 8-14. IEEE, (2021)DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks., , , , , и . NaNA, стр. 459-464. IEEE, (2023)Deep Learning as a Service Based on Encrypted Data., , , , и . NaNA, стр. 53-58. IEEE, (2020)