From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Probability Fusion Decision Framework of Multiple Deep Neural Networks for Fine-Grained Visual Classification., , , , , и . IEEE Access, (2019)Gain Without Pain: Accurate WiFi-based Localization using Fingerprint Spatial Gradient., , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (2): 29:1-29:19 (2017)An efficient strongly secure authenticated key exchange protocol without random oracles.. Secur. Commun. Networks, 8 (8): 1461-1473 (2015)Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation., , , и . Secur. Commun. Networks, 8 (18): 3356-3371 (2015)A new efficient signcryption scheme in the standard model.. Secur. Commun. Networks, 8 (5): 778-789 (2015)Power Allocation Study for Non-Orthogonal Multiple Access Networks With Multicast-Unicast Transmission., , , , и . IEEE Trans. Wirel. Commun., 17 (6): 3588-3599 (2018)A General Power Allocation Scheme to Guarantee Quality of Service in Downlink and Uplink NOMA Systems., , , и . IEEE Trans. Wirel. Commun., 15 (11): 7244-7257 (2016)Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks., , , , , , , , и . CoRR, (2023)Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference., , , , , , , и . CoRR, (2021)Chordal and factor-width decompositions for scalable semidefinite and polynomial optimization., , и . CoRR, (2021)