From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing Promotional Attacks in Mobile App Store., , , , и . ATIS, том 719 из Communications in Computer and Information Science, стр. 113-127. Springer, (2017)Location Management Method for Students on Campus Using Smartphones for Health and Safety., , , и . NBiS, том 526 из Lecture Notes in Networks and Systems, стр. 238-247. Springer, (2022)Fraglight: shedding light on broken pointcuts in evolving aspect-oriented software., , , и . SPLASH (Companion Volume), стр. 17-18. ACM, (2015)Performance study of inter-vehicle information dissemination using long range wireless system for assisting congestion resolution at sags., и . VNC, стр. 247-250. IEEE, (2017)Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services., , , , и . J. Inf. Process., (2020)Docking Simulation of Chemerin-9 and ChemR23 Receptor., , , , , и . ICBBB, стр. 22-27. ACM, (2020)Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N)., , , и . ASE, стр. 641-646. IEEE Computer Society, (2015)Poster: A First Look at the Privacy Risks of Voice Assistant Apps., , , , , и . CCS, стр. 2633-2635. ACM, (2019)Programmable Aperture Camera Using LCoS., , , , и . ECCV (6), том 6316 из Lecture Notes in Computer Science, стр. 337-350. Springer, (2010)Control of a quadrotor group based on maximum hands-off distributed control., , , , и . Int. J. Mechatronics Autom., 8 (4): 200-207 (2021)