From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Blind Recognition of Touched Keys on Mobile Devices., , , , , и . ACM Conference on Computer and Communications Security, стр. 1403-1414. ACM, (2014)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , и . AsiaCCS, стр. 523-528. ACM, (2013)Task-aware Similarity Learning for Event-triggered Time Series., , , , и . CoRR, (2022)Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , и . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , и . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Inverse transport calculations in optical imaging with subspace optimization algorithms., и . J. Comput. Phys., (2014)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , и . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids., , , , и . IEEE Netw., 31 (1): 59-63 (2017)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)MsDroid: Identifying Malicious Snippets for Android Malware Detection., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (3): 2025-2039 (мая 2023)