From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SwGridNet: A Deep Convolutional Neural Network based on Grid Topology for Image Classification.. CoRR, (2017)Detection and Analysis of Intrusion Attacks Using Deep Neural Networks.. NBiS, том 526 из Lecture Notes in Networks and Systems, стр. 258-266. Springer, (2022)Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network., , , и . BWCCA, стр. 389-394. IEEE Computer Society, (2014)A Proposal of Privacy Management Architecture., , , , , и . SAINT, стр. 161-164. IEEE Computer Society, (2010)A New Authentication Method with Distributed Hash Table for P2P Network., , , , , и . AINA Workshops, стр. 483-488. IEEE Computer Society, (2008)A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast., , , , , , и . CISIS, стр. 337-344. IEEE Computer Society, (2010)SS5 design of a P2P information sharing system and its application to communication support in natural disaster., , , и . ICCI*CC, стр. 118-125. IEEE Computer Society, (2013)Visitor Access Control Scheme Utilizing Social Relationship in the Real World., , , , , и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 95-107. Springer, (2010)A Simple Deep Learning Approach for Intrusion Detection System., и . ICMU, стр. 1-2. IEEE, (2021)An Overlay Authentication Network for Active Utilization of Private Information., , , , , , и . SAINT, стр. 185-188. IEEE Computer Society, (2010)