From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tornado: Enabling Blockchain in Heterogeneous Internet of Things Through a Space-Structured Approach., , , , и . IEEE Internet Things J., 7 (2): 1273-1286 (2020)Binaural sound localization based on deep neural network and affinity propagation clustering in mismatched HRTF condition., , , , и . EURASIP J. Audio Speech Music. Process., 2020 (1): 4 (2020)Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform., , , , и . COMPSAC, стр. 428-429. IEEE, (2022)Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio., , , , , и . COMPSAC (1), стр. 829-830. IEEE Computer Society, (2018)AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future., , , , , и . COMPSAC, стр. 991-992. IEEE, (2023)Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy., , , , , , и . COMPSAC, стр. 1010-1012. IEEE, (2023)Authentic Learning of Machine Learning to Ransomware Detection and Prevention., , , , и . COMPSAC, стр. 442-443. IEEE, (2022)Portable labs in a box for embedded system education., , и . ITiCSE, стр. 318. ACM, (2010)Ranking Cellular Internet Card User VIP Values Based on Graph Clustering with Usage Data., , , , , и . ICCC, стр. 1-6. IEEE, (2023)A User Experience Study on C2C E-Commerce Localization in China., , , и . HCI (11), том 4560 из Lecture Notes in Computer Science, стр. 363-371. Springer, (2007)