From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets., , , , и . IJDSN, (2017)Data hiding in color halftone images based on new conjugate property., и . Comput. Electr. Eng., (2018)Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks Neural Networks 16 (7) 995-1002., , и . Neural Networks, 17 (3): 465 (2004)Minimum length key in MST cryptosystems., , , , и . Sci. China Inf. Sci., 60 (5): 052106:1-052106:11 (2017)Quantum network coding for multi-unicast problem based on 2D and 3D cluster states., , , , и . Sci. China Inf. Sci., 59 (4): 042301:1-042301:15 (2016)Comment on Lee et al.'s group signature and e-auction scheme., , , , , и . Inf. Syst. Frontiers, 15 (1): 133-139 (2013)Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise., , , и . Quantum Inf. Process., 13 (1): 101-112 (2014)Finite-time synchronization of memristor-based neural networks with mixed delays., , , , и . Neurocomputing, (2017)Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method., , , , , и . Neurocomputing, (2017)An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography., , , и . Multim. Tools Appl., 76 (2): 1801-1815 (2017)