From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor., , , и . CoRR, (2019)An Efficient Incremental Lower Bound Approach for Solving Approximate Nearest-Neighbor Problem of Complex Vague Queries., , и . FQAS, том 2522 из Lecture Notes in Computer Science, стр. 140-153. Springer, (2002)Evaluating Session-Based Recommendation Approaches on Datasets from Different Domains., , и . FDSE, том 11814 из Lecture Notes in Computer Science, стр. 577-592. Springer, (2019)An effective flow aggregation for SDN-based background and foreground traffic control., , , , и . CCNC, стр. 1-4. IEEE, (2018)A Comparative Study of the Some Methods Used in Constructing Coresets for Clustering Large Datasets., , и . SN Comput. Sci., 1 (4): 215 (2020)Enhancing Big Data Conversion Validation with Alpha-Lightweight Coreset., и . SN Comput. Sci., 4 (6): 799 (ноября 2023)Anonymizing but Deteriorating Location Databases., и . Polibits, (2012)OpenK: An Elastic Data Cleansing System with A Clustering-based Data Anomaly Detection Approach., , и . ACOMP, стр. 120-127. IEEE, (2021)Data Poisoning Attack on Deep Neural Network and Some Defense Methods., , и . ACOMP, стр. 15-22. IEEE, (2020)Implementation and Evaluation of PartyCrasherBLE: An Energy-Efficient and Privacy-Preserving Authentication Protocol for BLE Devices., и . ACOMP, стр. 136-142. IEEE, (2021)