From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the security of a class of diffusion mechanisms for image encryption., , , , , , и . CoRR, (2015)Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security., , , , , и . IEEE Internet Things J., 6 (4): 5892-5901 (2019)An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems., , , , и . Expert Syst. Appl., (апреля 2023)Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation., , , , и . IEEE Trans. Ind. Electron., 70 (3): 2916-2926 (2023)Embedding cryptographic features in compressive sensing., , , , , , и . Neurocomputing, (2016)Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges., , , , , , , и . CoRR, (2022)CREAMS: Copyrighted Cloud Media Sharing., , , , и . CoRR, (2021)AGRAMPLIFIER: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification., , , , , , и . CoRR, (2023)Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network., , , , , , и . IEEE J. Biomed. Health Informatics, 26 (12): 5783-5792 (2022)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , и . CoRR, (2024)