From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recognition effect of models based on different microscope objectives., , , , , , , , , и . ISAIMS, стр. 133-141. ACM, (2022)PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments., , , , , , и . Trans. Emerg. Telecommun. Technol., (мая 2023)2D-DLPP Algorithm Based on SPD Manifold Tangent Space., , и . ICIC (4), том 14089 из Lecture Notes in Computer Science, стр. 201-212. Springer, (2023)Happy Toilet: A Social Analytics Approach to the Study of Public Toilet Cleanliness., , , , , и . IEEE BigData, стр. 6024-6026. IEEE, (2019)A framework for stock selection via concept-oriented attention representation in hypergraph neural network., , , и . Knowl. Based Syst., (2024)A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid., , , и . WoWMoM, стр. 288-293. IEEE, (2022)Reduced-Order Observer Based-Fault Estimation for Markovian Jump Systems With Time-Varying Generally Uncertain Transition Rates., и . IEEE Trans. Circuits Syst. I Regul. Pap., 67-I (8): 2803-2815 (2020)A Profit Maximization Strategy of MEC Resource Provider in the Satellite-Terrestrial Double Edge Computing System., , , и . ICCT, стр. 906-912. IEEE, (2021)Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints., , и . INFOCOM, стр. 136-140. IEEE, (2010)Dynamic memory-based event-triggered security control for networked control systems subjected to false-injection-data attack., , и . Syst. Control. Lett., (2024)