From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security hardening of open source software., , и . PST, том 380 из ACM International Conference Proceeding Series, стр. 43. ACM, (2006)Federated Machine Learning: Survey, Multi-Level Classification, Desirable Criteria and Future Directions in Communication and Networking Systems., , , и . IEEE Commun. Surv. Tutorials, 23 (2): 1342-1397 (2021)Sampling Online Social Networks with Tailored Mining Strategies., , , и . SNAMS, стр. 217-222. IEEE, (2019)Reward shaping using convolutional neural network., , , , и . Inf. Sci., (ноября 2023)Reinforcement R-learning model for time scheduling of on-demand fog placement., , и . J. Supercomput., 76 (1): 388-410 (2020)Overcoming Resource Bottlenecks in Vehicular Federated Learning: A Cluster-Based and QoS-Aware Approach., , , и . GLOBECOM, стр. 419-424. IEEE, (2023)Reinforcement Learning Based Scheme for On-Demand Vehicular Fog Formation and Micro Services Placement., , и . IWCMC, стр. 1244-1249. IEEE, (2022)Independent and Identically Distributed (IID) Data Assessment in Federated Learning., , , , , и . GLOBECOM, стр. 293-298. IEEE, (2022)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , и . Technique et Science Informatiques, 28 (5): 611-644 (2009)Towards efficient evaluation of XACML policies., и . PST, стр. 164-171. IEEE Computer Society, (2014)