From post

Ontology driven adaptive data processing in wireless sensor networks.

, , и . Infoscale, том 304 из ACM International Conference Proceeding Series, стр. 46. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fingerprint bio-key generation based on a deep neural network., , , , и . Int. J. Intell. Syst., 37 (7): 4329-4358 (2022)Non-norm-bounded Attack for Generating Adversarial Examples., , , , , , и . ICONIP (5), том 1333 из Communications in Computer and Information Science, стр. 420-428. Springer, (2020)Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks., , , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 613-629. Springer, (2019)A Face Privacy Protection Algorithm Based on Block Scrambling and Deep Learning., , и . ICCCS (3), том 11065 из Lecture Notes in Computer Science, стр. 359-369. Springer, (2018)Joint graph regularized extreme learning machine for multi-label image classification., , , и . J. Comput. Methods Sci. Eng., 18 (1): 213-219 (2018)Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients., , , , , и . IJCAI, стр. 1629-1635. ijcai.org, (2022)A Parallel Multi-Path Routing Algorithm for Flexible Transmission in Wireless Sensor Networks., и . AINA Workshops (2), стр. 213-218. IEEE Computer Society, (2007)Short Speech Key Generation Technology Based on Deep Learning., , и . ML4CS (2), том 13656 из Lecture Notes in Computer Science, стр. 422-435. Springer, (2022)Research and Prevention of Rogue AP Based MitM in Wireless Network., , и . 3PGCIC, стр. 538-542. IEEE Computer Society, (2014)A Biometric Key Generation Method for Fingerprint and Finger Vein Fusion., и . CSS (2), том 11983 из Lecture Notes in Computer Science, стр. 293-300. Springer, (2019)