From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on watermarking payload under the condition of keeping JPEG image transparency., , , , , , и . Multim. Tools Appl., 76 (6): 8423-8448 (2017)Generating facial expression adversarial examples based on saliency map., , , , и . Image Vis. Comput., (2021)PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs., , , , , и . Int. J. Intell. Syst., 37 (2): 1204-1221 (2022)Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption., , , , , и . Soft Comput., 22 (3): 707-714 (2018)Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks., , , , и . IEEE Trans. Inf. Forensics Secur., 11 (10): 2241-2254 (2016)Classify the Majority of the Total Bytes on the Internet., , , и . ISIP, стр. 68-72. IEEE Computer Society, (2008)A Star-Topological Privacy Encryption for Telecare Medical Information Systems., , и . INCoS, стр. 311-317. IEEE, (2016)Searching for optimal quantum secret sharing scheme based on local distinguishability., , , , , и . Quantum Inf. Process., 19 (10): 368 (2020)Secure and Flexible Digital Rights Management in a Pervasive Usage Mode., , и . CIS, стр. 863-867. IEEE Computer Society, (2007)Improved Remote User Authentication Scheme Preserving User Anonymity., , и . CNSR, стр. 323-328. IEEE Computer Society, (2007)