From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree., , и . CIT (2), стр. 236-241. IEEE Computer Society, (2009)978-0-7695-3836-5.WRLqueue: A Lock-Free Queue For Embedded Real-Time System., , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 1255-1260. IEEE, (2022)Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels., , , и . IWQoS, стр. 1-10. IEEE, (2021)An improved differential evolution algorithm based on the Sector Window Floating Zoom Immune Random Search operator., и . ICNC, стр. 392-396. IEEE, (2013)A privacy-preserving algorithm for distributed training of neural network ensembles., и . Neural Comput. Appl., 22 (Supplement-1): 269-282 (2013)TAMPC: A Controller for Escaping Traps in Novel Environments., , , и . IEEE Robotics Autom. Lett., 6 (2): 1447-1454 (2021)Toward Blind-Adaptive Remote Sensing Image Restoration., , , , , и . IEEE Trans. Geosci. Remote. Sens., (2023)An efficient algorithm for topology discovery of a blackbox communication network.. Appl. Math. Comput., 186 (1): 506-508 (2007)Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection., , , и . CoRR, (2021)Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results., , и . MADNES, том 4074 из Lecture Notes in Computer Science, стр. 67-79. Springer, (2005)