From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multiple Key-value Strategy in Recommendation Systems Incorporating Large Language Model., , , , , и . CoRR, (2023)HMMCF: A human-computer collaboration algorithm based on multimodal intention of reverse active fusion., , , и . Int. J. Hum. Comput. Stud., (2023)Robust EEG feature learning model based on an adaptive weight and pairwise-fused LASSO., , , , и . Biomed. Signal Process. Control., (2021)A zero-knowledge-proof-based digital identity management scheme in blockchain., и . Comput. Secur., (2020)Billing Attacks on SIP-Based VoIP Systems., , , и . WOOT, USENIX Association, (2007)An integrated inverse space sparse representation framework for tumor classification., , , , , , и . Pattern Recognit., (2019)Novel BD MU-MIMO Pre-Coding Methods to Suppress Noise and Balance Receive Antennas., , , и . VTC Fall, стр. 1-5. IEEE, (2008)An Online Adaptive Network Anomaly Detection Model., , , , и . CSO (2), стр. 365-368. IEEE Computer Society, (2009)978-0-7695-3605-7.TrafficSCINet: An Adaptive Spatial-Temporal Graph Convolutional Network for Traffic Flow Forecasting., , , , и . ICIC (1), том 14086 из Lecture Notes in Computer Science, стр. 628-639. Springer, (2023)DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle., и . ICCCS (2), том 11064 из Lecture Notes in Computer Science, стр. 670-683. Springer, (2018)