From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , и . ICTAI, стр. 947-954. IEEE, (2019)Template-Instance Loss for Offline Handwritten Chinese Character Recognition., , , и . ICDAR, стр. 315-322. IEEE, (2019)Robustness of fuzzy connectives and fuzzy reasoning with respect to general divergence measures., , , и . Fuzzy Sets Syst., (2016)AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities., , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 341-356. Springer, (2019)DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels., , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 614-621. IEEE, (2019)SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.. ACM Conference on Computer and Communications Security, стр. 2177. ACM, (2018)Zipper Stack: Shadow Stacks Without Shadow., , , , , , и . CoRR, (2019)Theory of commercial application management system and its implementation - AMPS., , , и . Parallel and Distributed Computing and Networks, стр. 75-83. IASTED/ACTA Press, (2007)Delta-Generalization: High Accuracy Data Release for Privacy Preserving., , , и . Trustcom/BigDataSE/ISPA, стр. 1861-1866. IEEE, (2016)A Strategy-Proof Combinatorial Auction-Based Grid Resource Allocation System., , , и . ICA3PP, том 4494 из Lecture Notes in Computer Science, стр. 254-266. Springer, (2007)