From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions., , и . IEEE Access, (2020)Two-Stage Deep Learning Framework for Discrimination between COVID-19 and Community-Acquired Pneumonia from Chest CT scans., , , и . Pattern Recognit. Lett., (2021)DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing., , , и . IEEE Trans. Intell. Transp. Syst., 24 (7): 7485-7493 (2023)Hunter in the Dark: Discover Anomalous Network Activities Using Deep Ensemble Networks., , , и . CoRR, (2021)Densely Connected Residual Network for Attack Recognition., , , и . TrustCom, стр. 233-242. IEEE, (2020)A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models., , и . SSCI, стр. 1499-1505. IEEE, (2020)Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems., , , , и . MSN, стр. 711-717. IEEE, (2020)A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions., и . CoRR, (2024)A Security-by-Design Decision-Making Model for Risk Management in Autonomous Vehicles., , , , и . IEEE Access, (2021)A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems., , , , и . IEEE Trans. Ind. Informatics, 18 (7): 5007-5017 (2022)