From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved Detection of User Malicious Behavior through Log Mining based on IHMM., , и . ICSAI, стр. 1193-1198. IEEE, (2018)Graph-augmented Convolutional Networks on Drug-Drug Interactions Prediction., , , , , и . CoRR, (2019)A New Small-World IoT Routing Mechanism based on Cayley Graphs., , , , и . CoRR, (2019)Power control in full duplex networks: Area spectrum efficiency and energy efficency., , , и . ICC, стр. 1-6. IEEE, (2017)On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination., , , и . SECON, стр. 82-90. IEEE, (2022)Analysis and Optimization of Local Delay for Cache-Enabled Networks with Random DTX., , , и . ICC, стр. 1-6. IEEE, (2021)Incorporating Android Code Smells into Java Static Code Metrics for Security Risk Prediction of Android Applications., , , , и . QRS, стр. 30-40. IEEE, (2020)Mixed Supervision for Instance Learning in Object Detection with Few-shot Annotation., , , , , и . ACM Multimedia, стр. 648-658. ACM, (2022)Real-Time Sensing and Communication Improvement with Mobile Sensors., , и . ICCC Workshops, стр. 71-76. IEEE, (2021)Device-free Location-independent Human Activity Recognition via Few-shot Learning., , , , , и . ICCC Workshops, стр. 106-111. IEEE, (2021)