From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DeepCPPred: A Deep Learning Framework for the Discrimination of Cell-Penetrating Peptides and Their Uptake Efficiencies., , , , , , и . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (5): 2749-2759 (2022)Corrigendum to Örchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space" Comput. Ind. 123 (December) (2020) 103334., , , и . Comput. Ind., (2021)Mobile agent watermarking (MAW): security properties and attacks revisited., , , , и . FIT, стр. 32:1-32:6. ACM, (2009)Blockchain-based secure multi-resource trading model for smart marketplace., , , и . Computing, 103 (3): 379-400 (2021)A Novel Method of Watermarking Relational Databases using Character String., , , , и . Artificial Intelligence and Applications, стр. 120-124. IASTED/ACTA Press, (2006)Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature., , и . IIH-MSP, стр. 566-569. IEEE Computer Society, (2007)Aggregated Signatures for Chaining: A Secure Provenance Scheme., , , и . Trustcom/BigDataSE/ISPA, стр. 2012-2017. IEEE, (2016)Adaptive Reputation Weights Assignment Scheme for MANETs., , , и . Trustcom/BigDataSE/ISPA, стр. 160-167. IEEE, (2016)Introducing Secure Provenance in IoT: Requirements and Challenges., , , , и . SIoT, стр. 39-46. IEEE Computer Society, (2016)On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)., , , , и . ISA, том 5576 из Lecture Notes in Computer Science, стр. 223-228. Springer, (2009)