From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Invisible Steganography via Generative Adversarial Network., , и . CoRR, (2018)Controlled remote state preparation of arbitrary two and three qubit states via the Brown state., , , , и . Quantum Inf. Process., 11 (6): 1653-1667 (2012)Efficiently secure multiparty computation based on homomorphic encryption., , , и . CCIS, стр. 343-349. IEEE, (2016)Efficient data possession-checking protocol with deduplication in cloud., , , , и . IJDSN, (2017)Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population., , , , , , и . BMC Medical Imaging, (2012)One Prediction Model Based on BP Neural Network for Newcastle Disease., , , , и . CCTA (2), том 294 из IFIP Advances in Information and Communication Technology, стр. 1209-1216. Springer, (2008)Optimal full-duplex relay selection for physical layer security in cooperative wireless networks., , и . ICCC, стр. 1-6. IEEE, (2017)An improved algorithm for community discovery in social networks based on label propagation., и . FSKD, стр. 1493-1497. IEEE, (2015)Two statistical traffic features for certain APT group identification., , , , , , , и . J. Inf. Secur. Appl., (2022)A Video Watermarking Algorithm of H.264/AVC for Content Authentication., , , , и . J. Networks, 7 (8): 1150-1154 (2012)