From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments., , , , и . IEEE Access, (2021)Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks., , , , , и . IEEE Internet Things J., 5 (2): 1043-1054 (2018)Efficient Federated Learning for AIoT Applications Using Knowledge Distillation., , , , , и . IEEE Internet Things J., 10 (8, April 15): 7229-7243 (2023)Non-Line-of-Sight Localization of Passive UHF RFID Tags in Smart Storage Systems., , , , и . IEEE Trans. Mob. Comput., 21 (10): 3731-3743 (2022)Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things., , , , и . IEEE Internet Things J., 7 (9): 9201-9213 (2020)NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering., , , , , , и . IEEE Trans. Veh. Technol., 72 (8): 10813-10825 (августа 2023)An Adaptive Multipath Algorithm to Overcome the Unpredictability of Heterogeneous Wireless Networks for High-Speed Railway., , , , , и . IEEE Trans. Veh. Technol., 67 (12): 11332-11344 (2018)A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration., , , и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 520-535. Springer, (2019)A Distributed Gateway Selection Algorithm for UAV Networks., , , , , , и . IEEE Trans. Emerg. Top. Comput., 3 (1): 22-33 (2015)Efficient Video Privacy Protection Against Malicious Face Recognition Models., , , и . IEEE Open J. Comput. Soc., (2022)