From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences., , , и . IEEE Trans. Reliability, 69 (1): 174-187 (2020)Characterizing the Capability of Vehicular Fog Computing in Large-scale Urban Environment., , , и . Mob. Networks Appl., 23 (4): 1050-1067 (2018)PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks., , , и . Secur. Commun. Networks, (2019)Real-Time and Accurate Gesture Recognition With Commercial RFID Devices., , , , , , , и . IEEE Trans. Mob. Comput., 22 (12): 7327-7342 (декабря 2023)Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems., , , , и . IEEE Trans. Mob. Comput., 20 (9): 2891-2905 (2021)Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method., , , , и . IEEE Trans. Mob. Comput., 21 (4): 1476-1491 (2022)Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things., , , и . IEEE Access, (2017)Who stole my cheese?: Verifying intactness of anonymous RFID systems., , , , , , и . Ad Hoc Networks, (2016)Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks., , , , , и . Comput. Commun., 36 (10-11): 1235-1244 (2013)Range-Based Localization for Sparse 3-D Sensor Networks., , , , , и . IEEE Internet Things J., 6 (1): 753-764 (2019)