From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Threats in 5G Edge Computing Environments., , и . ICTC, стр. 905-907. IEEE, (2020)Long-Term Evolution Vulnerability Focusing on System Information Block Messages., , , , , и . ICTC, стр. 837-842. IEEE, (2020)Content caching with bi-level control for efficient IPTV content steaming service., , и . ICOIN, стр. 439-443. IEEE Computer Society, (2014)Robust iris recognition with region division., и . Image Processing: Algorithms and Systems, том 5672 из SPIE Proceedings, стр. 161-168. SPIE, (2006)Vision-based speaker location detection., , и . Electronic Imaging: Image and Video Communications and Processing, том 5685 из SPIE Proceedings, SPIE, (2005)Multivariate Time Series Anomaly Detection with Deep Learning Models Leveraging Inter-Variable Relationships., , , , , и . SVCC, стр. 1-8. IEEE, (2023)Network Anomaly Detection based on Domain Adaptation for 5G Network Security., , , и . ICTC, стр. 976-980. IEEE, (2022)Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset., , , и . ICACT, стр. 254-258. IEEE, (2021)Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset., , , и . ICACT, стр. 254-258. IEEE, (2022)Three-Dimensional Pattern Matching., , и . SPAA, стр. 53-62. ACM, (1997)