From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , и . GraMSec@FLoC, том 11086 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2018)Deep-Confidentiality: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data., , , , , и . ACM Trans. Internet Techn., 22 (2): 42:1-42:21 (2022)Secure Logging as a Service Using Reversible Watermarking., , , , и . FNC/MobiSPC, том 110 из Procedia Computer Science, стр. 336-343. Elsevier, (2017)Aligning Research Resource and Researcher Representation: The eagle-i and VIVO Use Case., , , , , , , , , и . ICBO, том 833 из CEUR Workshop Proceedings, CEUR-WS.org, (2011)A methodology for image annotation of human actions in videos., , , , и . Multim. Tools Appl., 79 (33-34): 24347-24365 (2020)Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE., , , и . ARES, стр. 400-407. IEEE Computer Society, (2007)User Data Privacy in Web Services Context Using Semantic Desktop – SemanticLIFE Case Study, , и . The Tenth International Conference on Information Integration and Web-based Applications Services (iiWAS 2008), (2008)Blockchain-Based Software Process Improvement (BBSPI): An Approach for SMEs to Perform Process Improvement., , , , , и . IEEE Access, (2021)Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System., , , , , , и . IEEE Access, (2021)Automated Leukemia Screening and Sub-types Classification Using Deep Learning., , , , , , , , , и 1 other автор(ы). Comput. Syst. Sci. Eng., 46 (3): 3541-3558 (2023)