From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Abnormal Login Detection Method Based on Multi-source Log Fusion Analysis., , , , , и . ICBK, стр. 229-235. IEEE, (2019)Adaptive Carving Method for Live FLV Streaming., , , , , , , и . CollaborateCom, том 252 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 554-566. Springer, (2017)Robust Steganography by Modifying Sign of DCT Coefficients., , , и . IEEE Access, (2019)On the convergence of projected triangular decomposition methods for pricing American options with stochastic volatility., и . Appl. Math. Comput., (2013)Hierarchical Resampling Algorithm and Architecture for Distributed Particle Filters., , , , и . J. Signal Process. Syst., 71 (3): 237-246 (2013)A novel file carving algorithm for docker container logs recorded by json-file logging driver., , , и . Digit. Investig., (2021)A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks., , , , и . J. Inf. Secur. Appl., (августа 2023)Distinguishing between natural and recolored images via lateral chromatic aberration., , , , и . J. Vis. Commun. Image Represent., (2021)Incremental generalized multiple maximum scatter difference with applications to feature extraction., , , , , и . J. Vis. Commun. Image Represent., (2018)Remotely Access "My" Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme., , , , , и . IEEE Access, (2019)