From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext., , и . JDCTA, 4 (4): 7-14 (2010)A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy.. Secur. Commun. Networks, 6 (10): 1281-1289 (2013)A provable secure sealed-bid multi-attribute auction scheme under semi-honest model.. Int. J. Commun. Syst., 27 (12): 3738-3747 (2014)Opcode sequence analysis of Android malware by a convolutional neural network., , , , и . Concurr. Comput. Pract. Exp., (2020)An efficient combined deep neural network based malware detection framework in 5G environment., , , , , и . Comput. Networks, (2021)Dense Normal Based Degeneration-Aware 2-D Lidar Odometry for Correlative Scan Matching., , , , , и . IEEE Trans. Instrum. Meas., (2023)A Deep Learning Framework for Predicting Protein Functions With Co-Occurrence of GO Terms., , , , и . IEEE ACM Trans. Comput. Biol. Bioinform., 20 (2): 833-842 (марта 2023)ARdetector: android ransomware detection framework., , , , и . J. Supercomput., 80 (6): 7557-7584 (апреля 2024)Ambient-Aware LiDAR Odometry in Variable Terrains., , , , и . CoRR, (2023)SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection., , , , , , и . IEEE Trans. Netw. Serv. Manag., 19 (4): 3764-3780 (декабря 2022)