From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reemergence Modeling of Intelligent Information Diffusion in Heterogeneous Social Networks: The Dynamics Perspective., , , , , и . IEEE Trans. Netw. Sci. Eng., 8 (2): 828-840 (2021)Energy Balanced Dispatch of Mobile Edge Nodes for Confident Information Coverage Hole Repairing in IoT., , , , , и . IEEE Internet Things J., 6 (3): 4782-4790 (2019)Does OpenBSD and Firefox's Security Improve With Time?, , , , и . IEEE Trans. Dependable Secur. Comput., 20 (4): 2781-2793 (июля 2023)Automatically derived stateful network functions including non-field attributes., , , , , , и . TrustCom, стр. 944-951. IEEE, (2021)Multi-Tree Compact Hierarchical Tensor Recurrent Neural Networks for Intelligent Transportation System Edge Devices., , , , , и . IEEE Trans. Intell. Transp. Syst., 25 (8): 8719-8729 (августа 2024)Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal., , , , , , и . ICDM, стр. 428-437. IEEE, (2023)Placement of Access Points for Indoor Wireless Coverage and Fingerprint-Based Localization., , , , и . HPCC/EUC, стр. 2253-2257. IEEE, (2013)Data fusion based coverage optimization in heterogeneous sensor networks: A survey., , , , , и . Inf. Fusion, (2019)A Novel Confident Information Coverage Hole Detection Algorithm in Sensor Networks., , , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 199-204. IEEE, (2016)Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection., , , , , и . ICC, стр. 3118-3123. IEEE, (2022)