From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Self-constructing Compensatory Fuzzy Wavelet Network and Its Applications., , и . FSKD (1), том 3613 из Lecture Notes in Computer Science, стр. 743-756. Springer, (2005)Particle Filtering Based Remaining Useful Life Prediction for Electromagnetic Coil Insulation., , , , , , и . Sensors, 21 (2): 473 (2021)A Survey: Machine Learning Based Security Analytics Approaches and Applications of Blockchain in Network Security., , , , , , и . SmartBlock, стр. 17-22. IEEE, (2020)Edge Intelligence based Co-training of CNN., , , , , и . ICCSE, стр. 830-834. IEEE, (2019)An Improved Model Free Adaptive Control Algorithm., , , и . ICNC (1), стр. 70-74. IEEE Computer Society, (2009)Assessing the Feasibility of Game-Theory-Based Demand Response Management by Practical Implementation., , , , , , и . IEEE Access, (2021)Anomaly Detection on Time-series Logs for Industrial Network., , , , и . SmartBlock, стр. 81-86. IEEE, (2020)Experimental investigation of the packet loss rate of wireless industrial networks in real industrial environments., , , , , , и . ICIA, стр. 1048-1053. IEEE, (2015)Quantum Private Query of Blocks Based on D-dimensional Bell State., , и . ICBDC, стр. 104-108. ACM, (2021)Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs., , , , , и . BigDataSecurity/HPSC/IDS, стр. 140-144. IEEE, (2020)