From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , и . CoRR, (2018)Simulation and inversion of electrical conductivity distribution using the finite functions method., , , , и . FSKD, стр. 2746-2749. IEEE, (2012)Research on Embedded-Based Wireless Authentication System., , , и . ICICA (1), том 307 из Communications in Computer and Information Science, стр. 469-475. Springer, (2012)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, и . CoRR, (2013)Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , и . RecSys, стр. 385-386. ACM, (2016)A Bayesian Treatment for Singular Value Decomposition., , , и . HPCC/CSS/ICESS, стр. 1761-1767. IEEE, (2015)Fault tolerant scheduling with dynamic number of replicas in heterogeneous system., , , и . HPCC, стр. 434-441. IEEE, (2010)Modeling worms propagation on probability., , и . NSS, стр. 49-56. IEEE, (2011)Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice., , , и . INCoS, стр. 181-188. IEEE, (2013)Advance in Multiply Sectioned Bayesian Networks: Sensor Network Practitioners' Perspective., и . ETFA, стр. 590-593. IEEE, (2006)