From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology., и . IEEE Trans. Circuits Syst. II Express Briefs, 69 (3): 1727-1731 (2022)RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks., , , и . IEEE Trans. Syst. Man Cybern. Syst., 52 (10): 6383-6395 (2022)Reliability evaluation for NFV deployment of future mobile broadband networks., , , , и . IEEE Wirel. Commun., 23 (3): 90-96 (2016)EDF: Enhanced Deep Fingerprinting attacks on Websites., и . NaNA, стр. 293-299. IEEE, (2023)Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN., и . GLOBECOM, стр. 1-6. IEEE, (2020)Discovering Real-Time Reachable Area Using Trajectory Connections., , , , , , , и . DASFAA (2), том 12113 из Lecture Notes in Computer Science, стр. 36-53. Springer, (2020)Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction., , и . IEEE BigData, стр. 1381-1388. IEEE, (2019)Centrality Based Privacy Preserving for Weighted Social Networks., , , , и . CIS, стр. 574-577. IEEE Computer Society, (2017)Multi-hop Based Centrality of a Path in Complex Network., , , , и . CIS, стр. 292-296. IEEE Computer Society, (2017)Doing in One Go: Delivery Time Inference Based on Couriers' Trajectories., , , , , , , , , и . KDD, стр. 2813-2821. ACM, (2020)