From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme., , , , , и . J. Inf. Secur. Appl., (июня 2023)Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control., , , , , и . Neural Comput. Appl., 30 (7): 2217-2227 (2018)ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT., , , , и . IEEE Internet Things J., 10 (18): 15931-15942 (сентября 2023)Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System., , , и . IEEE Internet Things J., 7 (3): 2432-2451 (2020)Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations., , , , и . Neural Processing Letters, 47 (2): 679-696 (2018)General Theory of Security and a Study Case in Internet of Things., , , и . IEEE Internet Things J., 4 (2): 592-600 (2017)Multiple Vectors Propagation of Epidemics in Complex Networks., , , , и . CoRR, (2013)A secure and effective anonymous authentication scheme for roaming service in global mobility networks., , , и . CoRR, (2013)Multiple routes transmitted epidemics on multiplex networks., , , , и . CoRR, (2013)Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment., , , и . Secur. Commun. Networks, 9 (11): 1331-1339 (2016)