From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Video forensics research based on authenticity and integrity., , , , и . ICIA, стр. 1223-1226. IEEE, (2016)LOLWTC: A Deep Learning Approach for Detecting Living Off the Land Attacks., , , и . CCIS, стр. 176-181. IEEE, (2023)The Design of a Cloud Forensics Middleware System Base on Memory Analysis., , , , и . SoCPaR, том 942 из Advances in Intelligent Systems and Computing, стр. 258-267. Springer, (2018)A Video Watermarking Scheme Based on Multi-Algorithm Selection., , , и . IIH-MSP, стр. 252-255. IEEE, (2012)Review of intelligent video surveillance technology research., , , , и . EMEIT, стр. 230-233. IEEE, (2011)Linking social network accounts by modeling user spatiotemporal habits., , , , и . ISI, стр. 19-24. IEEE, (2017)Recognizing roles of online illegal gambling participants: An ensemble learning approach., , , , и . Comput. Secur., (2019)Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs., , , , , и . SecureComm (1), том 304 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 511-531. Springer, (2019)The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures., , , , , , и . TrustCom, стр. 804-813. IEEE, (2023)Development of a New-Style Desktop Manipulator., , и . RICAI, стр. 7-11. ACM, (2020)