From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of Digital-controlled Two-stage AC/DC Converter Based on GaN HEMT., , , , , и . IECON, стр. 1-6. IEEE, (2022)基于开源工具集的大数据网络安全态势感知及预警架构 (Framework for Big Data Network Security Situational Awareness and Threat Warning Based on Open Source Toolset)., , и . 计算机科学, 44 (5): 125-131 (2017)Two-Round Password-Based Authenticated Key Exchange from Lattices., , , , и . Wirel. Commun. Mob. Comput., (2020)Document-Centric Query Answering for the Semantic Web., и . Web Intelligence, стр. 409-415. IEEE Computer Society, (2007)Partitioning OWL Knowledge Bases for Parallel Reasoning., , , и . ICSC, стр. 108-115. IEEE Computer Society, (2014)TNC-eSA: An Echanced Security Access Solution to Office Networks., , и . ICICA (LNCS), том 7473 из Lecture Notes in Computer Science, стр. 770-777. Springer, (2012)Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks., , , , и . MSN, стр. 208-211. IEEE Computer Society, (2008)Privacy-preserving and communication-efficient federated learning in Internet of Things., , , , , и . Comput. Secur., (2021)An Initial Investigation into Querying an Untrustworthy and Inconsistent Web., и . Trust@ISWC, том 127 из CEUR Workshop Proceedings, CEUR-WS.org, (2004)An Insider Threat Detection Method Based on Business Process Mining., , , , и . Int. J. Bus. Data Commun. Netw., 13 (2): 83-98 (2017)