From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Brain MRI imaging mechanism based on deep visual information perception and dementia degree induction., , , , , , , , и . Multimedia Tools Appl., 78 (7): 8841-8859 (2019)An optimizing method for bus-only signal based on Fuzzy Control., и . FSKD, стр. 429-432. IEEE, (2012)An ensemble belief rule base model for pathologic complete response prediction in gastric cancer., , , , , , и . Expert Syst. Appl., (декабря 2023)GPT Conjecture: Understanding the Trade-offs between Granularity, Performance and Timeliness in Control-Flow Integrity., и . CoRR, (2019)Comparison of Security Frameworks for Governmental Clouds between United States and European Union., , , и . ICCNS, стр. 30-34. ACM, (2016)A deep transfer learning-based protocol accelerates full quantum mechanics calculation of protein., , , , , , , и . Briefings Bioinform., (января 2023)Potential inhibitors for the novel coronavirus (SARS-CoV-2)., , , , и . Briefings Bioinform., 22 (2): 1225-1231 (2021)ROPOB: Obfuscating Binary Code via Return Oriented Programming., , , , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 721-737. Springer, (2017)A hybrid LLM workflow can help identify user privilege related variables in programs of any size., , и . CoRR, (2024)Using Deep Learning to Solve Computer Security Challenges: A Survey., , , , , , , и . CoRR, (2019)