From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DIAMI: Distributed Intelligent Environment for Blind Musicians., , , , , и . IWANN (2), том 5518 из Lecture Notes in Computer Science, стр. 475-482. Springer, (2009)Chatbot to Assist the Learning Process of Programming in Python., , , и . WorldCIST (2), том 800 из Lecture Notes in Networks and Systems, стр. 318-328. Springer, (2023)Organization Modelling to Support Access Control for Collaborative Systems., , , и . Software Engineering Research and Practice, стр. 757-763. CSREA Press, (2006)Task Model Representation of a Collaborative System using Hypermedia Networks., , , и . WEBIST (3), стр. 113-120. INSTICC Press, (2007)An Augmented Reality Mobile App for Museums: Virtual Restoration of a Plate of Glass., , , , , , , и . EuroMed (1), том 11196 из Lecture Notes in Computer Science, стр. 539-547. Springer, (2018)Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges., , , , , , , и . IEEE Commun. Surv. Tutorials, 25 (4): 2983-3013 (Fourthquarter 2023)Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology., , , , , и . CoRR, (2021)Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield., , , , , , и . MILCOM, стр. 673-678. IEEE, (2023)Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario., , , , , , и . Appl. Intell., 54 (8): 6637-6653 (апреля 2024)RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoT., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)