From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key Management Scheme Based on Secret Sharing for Wireless Sensor Network., , и . EIDWT, стр. 574-578. IEEE Computer Society, (2013)A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network., , , и . IJDSN, (2013)Epileptic EEG Signals Recognition Using a Deep View-Reduction TSK Fuzzy System With High Interpretability., , , , и . IEEE Access, (2019)Multichannel Residual Conditional GAN-Leveraged Abdominal Pseudo-CT Generation via Dixon MR Images., , , , , , , и . IEEE Access, (2019)Secure multiparty computation of solid geometric problems and their applications., , , и . Inf. Sci., (2014)Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor., , , и . PAISI, том 7299 из Lecture Notes in Computer Science, стр. 176-189. Springer, (2012)Common and Special Knowledge-Driven TSK Fuzzy System and Its Modeling and Application for Epileptic EEG Signals Recognition., , , и . IEEE Access, (2019)Novel wind-speed prediction system based on dimensionality reduction and nonlinear weighting strategy for point-interval prediction., , , и . Expert Syst. Appl., (2024)Modelling Impacts of Environmental Water on Vegetation of a Semi-Arid Floodplain-Lakes System Using 30-Year Landsat Data., , и . Remote. Sens., 14 (3): 708 (2022)Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison., , , и . IEEE Access, (2018)