From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of SVEIR worm attack model with saturated incidence and partial immunization., , , и . J. Comm. Inform. Networks, 1 (4): 105-115 (2016)Multi-Agent Q-Learning Aided Backpressure Routing Algorithm for Delay Reduction., , , и . CoRR, (2017)Anomalies Detection of Routers Based on Multiple Information Learning., , , , и . NaNA, стр. 206-211. IEEE, (2018)DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification., , , , , и . IEEE Access, (2019)Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm., , , , , и . NaNA, стр. 458-463. IEEE, (2019)Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems., , , и . SciSec, том 13580 из Lecture Notes in Computer Science, стр. 276-284. Springer, (2022)Obstacle-avoiding rectilinear Steiner minimum tree construction based on Discrete Particle Swarm Optimization., , и . ICNC, стр. 2179-2183. IEEE, (2011)SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs., , , , , и . IEEE/ACM Trans. Netw., 31 (4): 1463-1477 (августа 2023)QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers., , , , , и . IEEE Trans. Wirel. Commun., 20 (8): 4902-4916 (2021)Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data., , , , , и . IEEE Trans. Parallel Distributed Syst., 30 (12): 2650-2662 (2019)