From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An evaluation method of image scrambling degree based on pixel distribution., , , , , и . SocialSec, стр. 33-38. IEEE, (2018)Secure Network Coding against Wiretapping and Byzantine Attacks., , , и . EURASIP J. Wireless Comm. and Networking, (2010)An Optimization Method Inspired by "chaotic" Ant Behavior., , , и . Int. J. Bifurc. Chaos, 16 (8): 2351-2364 (2006)Anonymous three-factor authenticated key agreement for wireless sensor networks., , , и . Wireless Networks, 25 (4): 1461-1475 (2019)Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function., , , и . IEEE Internet Things J., 10 (5): 4557-4578 (марта 2023)Finite-time topology identification and stochastic synchronization of complex network with multiple time delays., , , , , и . Neurocomputing, (2017)Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid., , , , и . IEEE Syst. J., 15 (1): 395-406 (2021)Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation., , , и . IEEE Trans. Multim., (2024)Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing., , и . Secur. Commun. Networks, (2020)Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes., , , , и . Secur. Commun. Networks, (2020)