From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unsupervised GAN-Based Intrusion Detection System Using Temporal Convolutional Networks and Self-Attention., , , , и . IEEE Trans. Netw. Serv. Manag., 20 (4): 4951-4963 (декабря 2023)An IMS Based Inter-working Solution for Multimedia Service in a Converged Network.. MUE, стр. 19-24. IEEE Computer Society, (2008)A group common community conversation - C3 service across different social networks., , и . PIMRC, стр. 2577-2582. IEEE, (2012)Multi-Objective GAN-Based Adversarial Attack Technique for Modulation Classifiers., , , , и . IEEE Commun. Lett., 26 (7): 1583-1587 (2022)A Study on the Use of Runtime Files in Handling Crash Reports in a Large Telecom Company., , , , , , и . FNWF, стр. 98-103. IEEE, (2022)Subscriber data and semantic web for provisioning novel end-user services in telecommunication networks., , , и . IEEE Commun. Mag., 50 (3): 42-50 (2012)Method of Inter-Working between IMS and Non-IMS (Google Talk) Networks for Multimedia Services., и . SIGMAP, стр. 251-256. INSTICC Press, (2008)Network Intrusion Detection via Flow-to-Image Conversion and Vision Transformer Classification., , , и . IEEE Access, (2022)EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum., , и . ACM Trans. Internet Techn., 24 (1): 2:1-2:30 (февраля 2024)A Novel Lookup Service Enabler for Presence-Based Applications and Its Architecture in the 3GPP IP Multimedia Subsystem., , , и . NTMS, стр. 1-6. IEEE, (2009)