From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks., , , и . Sci. China Inf. Sci., (2021)Deep Low Light Image Enhancement Via Multi-Scale Recursive Feature Enhancement and Curve Adjustment., , и . ICASSP, стр. 1-5. IEEE, (2023)Asymmetric Group Key Agreement with Traitor Traceability., , и . CIS, стр. 347-351. IEEE Computer Society, (2010)Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health., , , , , , и . NaNA, стр. 319-324. IEEE, (2019)A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period., , и . Future Internet, 14 (10): 289 (2022)PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks., , , , и . NaNA, стр. 5-10. IEEE Computer Society, (2017)Social relationship for physical objects., , , и . Int. J. Distributed Sens. Networks, (2018)LF-ViT: Reducing Spatial Redundancy in Vision Transformer for Efficient Image Recognition., , , , , , и . AAAI, стр. 2274-2284. AAAI Press, (2024)A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce., , , и . ICCNMC, том 3619 из Lecture Notes in Computer Science, стр. 1287-1294. Springer, (2005)A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain., , , и . WAIM, том 3739 из Lecture Notes in Computer Science, стр. 670-675. Springer, (2005)