From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification., , и . ICRA, стр. 5255-5261. IEEE, (2020)DeepContext: Mobile Context Modeling and Prediction via HMMs and Deep Learning., , и . IEEE Trans. Mob. Comput., 22 (12): 6874-6888 (декабря 2023)CloudID: Trustworthy cloud-based and cross-enterprise biometric identification., , и . Expert Syst. Appl., 42 (21): 7905-7916 (2015)CPAC: securing critical infrastructure with cyber-physical access control., , , , и . ACSAC, стр. 139-152. ACM, (2016)TroGuard: context-aware protection against web-based socially engineered trojans., , , и . ACSAC, стр. 66-75. ACM, (2014)RRE: A game-theoretic intrusion Response and Recovery Engine., , , и . DSN, стр. 439-448. IEEE Computer Society, (2009)Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords., , , , и . DSN, стр. 583-594. IEEE Computer Society, (2016)TMQ: Threat model quantification in Smart Grid critical infrastructures., и . SmartGridComm, стр. 584-589. IEEE, (2014)Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems., , , , и . ICONIP (5), том 14451 из Lecture Notes in Computer Science, стр. 188-201. Springer, (2023)Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems., , , , , , и . IEEE Access, (2021)