From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , и . ISCID (1), стр. 43-48. IEEE, (2017)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., и . ICC, стр. 1-5. IEEE, (2010)Wiretap Channel with Information Embedding on Actions., и . Entropy, 16 (4): 2105-2130 (2014)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , и . CIT, стр. 263-269. IEEE Computer Society, (2014)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , и . ICYCS, стр. 2198-2203. IEEE Computer Society, (2008)Character-Level Intrusion Detection Based On Convolutional Neural Networks., , и . IJCNN, стр. 1-8. IEEE, (2018)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , и . TrustCom, стр. 97-103. IEEE, (2020)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , и . ICC, стр. 2688-2693. IEEE, (2022)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , и . IWQoS, стр. 1-10. IEEE, (2022)GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas., , , , , , , и . SP, стр. 1649-1666. IEEE, (2023)