From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Cloud-Based Active Defense System against Malicious Codes., , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 690-695. Springer, (2014)On the Zero Forcing Number and Spectral Radius of Graphs., , , и . Electron. J. Comb., (2022)Large universe multi-authority attribute-based PHR sharing with user revocation., , , и . Int. J. Comput. Sci. Eng., 19 (3): 376-386 (2019)Neural networks trained with high-dimensional functions approximation data in high-dimensional space., , , , , , и . J. Intell. Fuzzy Syst., 41 (2): 3739-3750 (2021)Secure Cloud Data Deduplication with Efficient Re-Encryption., , , , , и . IEEE Trans. Serv. Comput., 15 (1): 442-456 (2022)Receiver design for OFDM-CDMA systems with multiplexed STBC., , и . PIMRC, стр. 2420-2424. IEEE, (2005)The chromatic equivalence class of graph ‾Bn-6, 12., , , и . Discussiones Mathematicae Graph Theory, 28 (2): 189-218 (2008)Spatial Compression for Fronthaul-Constrained Uplink Receiver in 5G Systems., , , и . WCNC, стр. 1-6. IEEE, (2019)A new expression for the adjoint polynomial of a path., , , , и . Australas. J Comb., (2009)Applications, challenges, and prospective in emerging body area networking technologies., и . IEEE Wirel. Commun., 17 (1): 80-88 (2010)