From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cyberbullying Detection, Based on the FastText and Word Similarity Schemes., , , , , и . ACM Trans. Asian Low Resour. Lang. Inf. Process., 20 (1): 2:1-2:15 (2021)IMMAT: Mesh Reconstruction from Single View Images by Medial Axis Transform Prediction., , , , , и . Comput. Aided Des., (2022)P2MAT-NET: Learning medial axis transform from sparse point clouds., , , , , , , и . Comput. Aided Geom. Des., (2020)基于层次聚类的警报处理方法 (Alert Processing Method Based on Hierarchical Clustering)., , и . 计算机科学, 46 (4): 203-209 (2019)Adjusted regularized estimation in the accelerated failure time model with high dimensional covariates., и . J. Multivar. Anal., (2013)Exploiting full Duplex techniques for secure communication in SWIPT system., , , , , и . WCSP, стр. 1-6. IEEE, (2015)Secure transmission of cognitive untrusted relay networks with selection diversity., , , , , и . WCSP, стр. 1-5. IEEE, (2017)Street-Level Landmark Evaluation Based on Nearest Routers., , , , и . Secur. Commun. Networks, (2018)A K-anonymous clustering algorithm based on the analytic hierarchy process., , , , и . J. Vis. Commun. Image Represent., (2019)Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay., , , , и . IEEE Access, (2018)