From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Shape Retrieval with Adjustable Precision for Hole Detection in 3D Wireless Sensor Networks., , , , и . APCC, стр. 622-627. IEEE, (2018)RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation., , и . ICCPS, стр. 77-86. ACM, (2021)A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease., , , , и . PAC, стр. 107-116. IEEE, (2018)Adaptive Sampling and Quick Anomaly Detection in Large Networks., , , , и . IEEE Trans Autom. Sci. Eng., 20 (4): 2253-2267 (октября 2023)Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance., , , , , и . ICC, стр. 1-6. IEEE, (2018)Special Issue: Resilient Distributed Estimator with Information Consensus for CPS Security., , , и . ICCD, стр. 41-44. IEEE, (2020)Data sweeping in deterministic trajectories-covered Wireless Sensor Networks., , , и . ICC, стр. 6312-6317. IEEE, (2015)CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks., , , и . SmartGridComm, стр. 95-101. IEEE, (2021)Security for safety: a path toward building trusted autonomous vehicles., , , , и . ICCAD, стр. 92. ACM, (2018)Protecting Platoons from Stealthy Jamming Attack., , , и . AsianHOST, стр. 1-6. IEEE, (2020)