From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of privacy protection techniques for mobile devices., , , , и . J. Comm. Inform. Networks, 1 (4): 86-92 (2016)Non-Cascaded Sensorless Control of SPMSM Based on Cascaded Extended State Observer., , , , , , и . IEEE Access, (2024)Message Forwarding Scheme for Multi-area Opportunistic Network Based on Message Significance., , , и . CWSN, том 501 из Communications in Computer and Information Science, стр. 380-392. Springer, (2014)An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism., , , , и . ICC, стр. 1-6. IEEE, (2019)Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets., , , , и . Sensors, 17 (3): 550 (2017)Detecting stealthy attacks on industrial control systems using a permutation entropy-based method., , , , , , и . Future Gener. Comput. Syst., (2020)iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting., , , , и . IEEE J. Sel. Areas Commun., 38 (5): 955-967 (2020)Compromised IoT Devices Detection in Smart Home via Semantic Information., , , , , и . ICC, стр. 4986-4992. IEEE, (2022)Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing., , , , , и . SRDS, стр. 166-177. IEEE, (2022)An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications., , , , , и . SecureComm, том 164 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 418-437. Springer, (2015)