From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Time-Bound Hierarchical Key Management in Cloud Computing., , , , и . ECC (1), том 297 из Advances in Intelligent Systems and Computing, стр. 31-38. Springer, (2014)An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network., и . IITSI, стр. 511-516. IEEE Computer Society, (2010)Analyzing Selfish Behavior in Opportunistic Networks., , , и . ISPAN-FCST-ISCC, стр. 218-225. IEEE Computer Society, (2017)Security Issues and Challenges for Cyber Physical System., , , , , и . GreenCom/CPSCom, стр. 733-738. IEEE Computer Society, (2010)A New Graphical Representation of Protein Sequences Based on Dual-Vector Model., , , и . BIC-TA, том 472 из Communications in Computer and Information Science, стр. 629-632. Springer, (2014)Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization., , , , , и . IEEE Trans. Medical Imaging, 43 (10): 3596-3607 (октября 2024)Joint-learning segmentation in Internet of drones (IoD)-based monitor systems., , , , и . Comput. Commun., (2020)Multilayer Dense Attention Model for Image Caption., , , , и . IEEE Access, (2019)Transfer reinforcement learning-based road object detection in next generation IoT domain., , , , , и . Comput. Networks, (2021)Weaving rewrite-based access control policies., , , и . FMSE, стр. 71-80. ACM, (2007)