From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Dynamic Attack on Classical Ciphers Using an Attention-Based LSTM Encoder-Decoder Model., , , и . IEEE Access, (2021)Industrial HPC activities in Korea., , , , и . HPCS, стр. 814-818. IEEE, (2011)A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments., , , и . Secur. Commun. Networks, (2018)Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers., , , и . Pattern Recognit., (2022)Quantum Dwarf Mongoose Optimization With Ensemble Deep Learning Based Intrusion Detection in Cyber-Physical Systems., , , , , и . IEEE Access, (2023)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , и . CSA/CUTE, том 373 из Lecture Notes in Electrical Engineering, стр. 437-443. Springer, (2015)Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT., , , , , и . IEEE Access, (2023)The MAP/PH/N/∞ Queueing-Inventory System With Demands From a Random Environment., , , , , , и . IEEE Access, (2022)SDBA: A Stealthy and Long-Lasting Durable Backdoor Attack in Federated Learning., , , и . CoRR, (2024)Behavior Recognition of a Person in a Daily Video Using Joint Position Information., , , , и . AIKE, стр. 172-174. IEEE Computer Society, (2018)