From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem., , , и . Comput. Commun., (2020)Mutually beneficial learning with application to on-line news classification., , , , и . PIKM, стр. 85-92. ACM, (2007)Privacy Preserving on Updated Parameters in Federated Learning., , , и . ACM TUR-C, стр. 27-31. ACM, (2020)Motion vector modification distortion analysis-based payload allocation for video steganography., и . J. Vis. Commun. Image Represent., (2021)Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams., , и . Signal Process., (2016)Passive detection of doctored JPEG image via block artifact grid extraction., , и . Signal Process., 89 (9): 1821-1829 (2009)TCCF: Tracking Based on Convolutional Neural Network and Correlation Filters., , и . ICIG (1), том 10666 из Lecture Notes in Computer Science, стр. 316-327. Springer, (2017)Real-time Anomaly Detection with HMOF Feature., , , , и . ICVIP, стр. 49-54. ACM, (2018)Pyramid Sub-Region Sensitive Network for Object Detection., , , и . ICIP, стр. 1303-1307. IEEE, (2018)Quadtree-based optimal path routing with the smallest routing table size., , , и . GLOBECOM, стр. 4598-4603. IEEE, (2014)