From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stealthy and Flexible Trojan in Deep Learning Framework., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 1789-1798 (мая 2023)Software Misconfiguration Troubleshooting Based on State Analysis., , , , , и . DSC, стр. 361-366. IEEE, (2021)Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification., , , , и . IEEE Trans. Intell. Transp. Syst., 24 (2): 2578-2595 (февраля 2023)A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration., , , , , и . J. Ambient Intell. Humaniz. Comput., 14 (10): 13661-13672 (октября 2023)An Improved Multi-agent Approach for Solving Large Traveling Salesman Problem., , , , и . PRIMA, том 4088 из Lecture Notes in Computer Science, стр. 351-361. Springer, (2006)A VirtualXposed-Based Inline Hooking Framework for Android Native Methods., , , , , и . SocialSec, том 1298 из Communications in Computer and Information Science, стр. 245-253. Springer, (2020)Energy Aware Data Layout for De-duplication System., , , , , и . PDCAT, стр. 511-516. IEEE, (2012)Research on Bluetooth protocols based on Android kernel log., , , , и . Int. J. Comput. Sci. Math., 6 (1): 78-87 (2015)Identification of NAND flash ECC algorithms in mobile devices., , и . Digit. Investig., 9 (1): 34-48 (2012)A feature-vector generative adversarial network for evading PDF malware classifiers., , , , и . Inf. Sci., (2020)