From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment., , , , и . J. Networks, 9 (2): 283-290 (2014)MPCE: A Maximum Probability Based Cross Entropy Loss Function for Neural Network Classification., , , , , и . IEEE Access, (2019)B-iTRF: A novel bio-inspired trusted routing framework for wireless sensor networks., , , , , и . WCNC, стр. 2242-2247. IEEE, (2014)A Bio-inspired Multidimensional Network Security Model., , , и . IMSCCS (2), стр. 3-7. IEEE Computer Society, (2006)0-7695-2581-4.A Computer Immune System: LAN Immune System Model based on Host (LISMH)., и . IMSCCS (2), стр. 207-211. IEEE Computer Society, (2006)0-7695-2581-4.Chinese Text Feature Dimension Reduction Based on Semantics., , , и . CLSW, том 8229 из Lecture Notes in Computer Science, стр. 396-405. Springer, (2013)A randomized block policy gradient algorithm with differential privacy in Content Centric Networks., , , , , и . Int. J. Distributed Sens. Networks, 17 (12): 155014772110599 (2021)Latency-Optimal Computational Offloading Strategy for Sensitive Tasks in Smart Homes., , , , и . Sensors, 21 (7): 2347 (2021)Decentralized multi-task reinforcement learning policy gradient method with momentum over networks., , , , , и . Appl. Intell., 53 (9): 10365-10379 (мая 2023)A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks., , , , , и . KSII Trans. Internet Inf. Syst., 8 (1): 74-90 (2014)