From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LQ Control under Security Constraints., , и . CPSW@CISS, том 449 из Lecture Notes in Control and Information Sciences, стр. 101-120. Springer, (2013)QoI-aware tradeoff between communication and computation in wireless ad-hoc networks., , и . PIMRC, стр. 1-6. IEEE, (2016)Achieving Consensus in Self-Organizing Wireless Sensor Networks: The Impact of Network Topology on Energy Consumption., , и . ICASSP (2), стр. 841-844. IEEE, (2007)Performance analysis of cyclic estimators for harmonics in multiplicative and additive noise., и . ICASSP, стр. 2309-2312. IEEE, (1998)A distributed, energy-efficient and QoI-aware framework for in-network processing., , и . PIMRC, стр. 1706-1710. IEEE, (2014)MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design., , , , , и . ICNP, стр. 1-11. IEEE, (2019)A diagnosis based intrusion detection approach., , , , , и . MILCOM, стр. 929-934. IEEE, (2015)Stochastic modeling and particle filtering algorithms for tracking a frequency-hopped signal., , , и . IEEE Trans. Signal Process., 57 (8): 3108-3118 (2009)Distributed joint power and admission control for ad-hoc and cognitive underlay networks., , и . ICASSP, стр. 3014-3017. IEEE, (2010)Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks., , , , и . IEEE Symposium on Security and Privacy, стр. 582-597. IEEE Computer Society, (2016)