From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Cloud-Based Active Defense System against Malicious Codes., , , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 690-695. Springer, (2014)The chromatic equivalence class of graph ‾Bn-6, 12., , , и . Discussiones Mathematicae Graph Theory, 28 (2): 189-218 (2008)Publicly verifiable database scheme with efficient keyword search., , , и . Inf. Sci., (2019)GIT: A Generative Image-to-text Transformer for Vision and Language., , , , , , , , и . Trans. Mach. Learn. Res., (2022)Verifiable memory leakage-resilient dynamic searchable encryption., , , и . J. High Speed Networks, 24 (3): 201-217 (2018)Idea2Img: Iterative Self-Refinement with GPT-4V(ision) for Automatic Image Design and Generation., , , , , , и . CoRR, (2023)Hierarchically Structured Reinforcement Learning for Topically Coherent Visual Story Generation., , , , , и . CoRR, (2018)Towards efficient privacy-preserving encrypted image search in cloud computing., , , и . Soft Comput., 23 (6): 2101-2112 (2019)Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond., , , , и . CCS, стр. 2825-2839. ACM, (2022)DEsignBench: Exploring and Benchmarking DALL-E 3 for Imagining Visual Design., , , , и . CoRR, (2023)