From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CODA: Toward Automatically Identifying and Scheduling Coflows in the Dark., , , , , и . SIGCOMM, стр. 160-173. ACM, (2016)Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation., , , , , , , , , и . IEEE Trans. Mob. Comput., 19 (12): 2946-2964 (2020)RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems., , , , и . Inscrypt, том 12020 из Lecture Notes in Computer Science, стр. 101-117. Springer, (2019)Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT., , , и . J. Cloud Comput., (2022)Multi-omics of Circular RNAs and Their Responses to Hormones in Moso Bamboo (Phyllostachys edulis)., , , , , , , , , и 8 other автор(ы). Genom. Proteom. Bioinform., 21 (4): 866-885 (августа 2023)Moving Object Counting Using a Tripwire in H.265/HEVC Bitstreams for Video Surveillance., , , и . IEEE Access, (2016)Polar Coding for Parallel Gaussian Channels., , , , и . ISIT, стр. 1407-1411. IEEE, (2019)1dVul: Discovering 1-Day Vulnerabilities through Binary Patches., , , , , , и . DSN, стр. 605-616. IEEE, (2019)An Empirical Study of the Maintenance Effort., и . SEKE, стр. 242-245. (2006)Training Deep Bidirectional LSTM Acoustic Model for LVCSR by a Context-Sensitive-Chunk BPTT Approach., и . IEEE ACM Trans. Audio Speech Lang. Process., 24 (7): 1185-1193 (2016)