From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing multi-tenancy security in the cloud computing using hybrid ECC-based data encryption approach., и . IET Commun., 14 (18): 3212-3222 (2020)Average SER analysis of two-hop WP DF relay system under κ - μ shadowed fading., и . IET Commun., 15 (1): 1-13 (2021)An interaction-based method for detecting overlapping community structure in real-world networks., и . Int. J. Data Sci. Anal., 14 (1): 27-44 (2022)Information diffusion modeling and analysis for socially interacting networks., и . Soc. Netw. Anal. Min., 11 (1): 11 (2021)marl-jax: Multi-agent Reinforcement Leaning Framework for Social Generalization., , и . ECML/PKDD (7), том 14175 из Lecture Notes in Computer Science, стр. 300-304. Springer, (2023)Extracting Emotion Quotient of Viral Information Over Twitter., , и . ICDCIT, том 13145 из Lecture Notes in Computer Science, стр. 210-226. Springer, (2022)Enhancing ML model accuracy for Digital VLSI circuits using diffusion models: A study on synthetic data generation., , и . CoRR, (2023)How Bad/Good Are the External Forward Shock Models of Gamma-Ray Bursts?, , , , , , , , , и 1 other автор(ы). (12.03.2015)Spoken Language Identification Using Hybrid Feature Extraction Methods, , , и . CoRR, (2010)Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata., и . SIN, стр. 103-110. ACM, (2012)