From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Security Situation Assessment Based on HMM., , , , , и . ICIC (2), том 6839 из Lecture Notes in Computer Science, стр. 387-394. Springer, (2011)An adaptive fault tolerance strategy for cloud storage., , и . KSII Trans. Internet Inf. Syst., 10 (11): 5290-5304 (2016)Network Security Situation Assessment Based on Stochastic Game Model., , , , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 517-525. Springer, (2011)A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services., , , , и . IEEE Access, (2018)An accurate and efficient two-phase scheme for detecting Android cloned applications., , , и . Concurr. Comput. Pract. Exp., (2021)MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection., , и . CSCloud/EdgeCom, стр. 144-149. IEEE, (2023)Network Security Situation Assessment Based on Hidden Semi-Markov Model., , , , и . ICIC (1), том 6838 из Lecture Notes in Computer Science, стр. 509-516. Springer, (2011)Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces., , , , и . Int. J. Semantic Web Inf. Syst., 20 (1): 1-18 (2024)