From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Constructions of Equality Test Scheme Without Random Oracles., , , , , и . IEEE Access, (2023)Automatic Hair Segmentation in Complex Background., , и . ROBIO, стр. 2496-2501. IEEE, (2019)A Security Control Model Based on Petri Net for Industrial IoT., , , , , и . ICII, стр. 156-159. IEEE, (2019)Dynamic Attack and Defense Security Situation Assessment Model for Power Information Physical Fusion System., , , , , и . ICII, стр. 152-155. IEEE, (2019)eRAID: Conserving Energy in Conventional Disk-Based RAID System., , и . IEEE Trans. Computers, 57 (3): 359-374 (2008)A Security Evaluation Model Based on Fuzzy Hierarchy Analysis for Industrial Cyber-Physical Control Systems., , , , и . ICII, стр. 62-65. IEEE, (2019)Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems., , и . IEEE Trans. Computers, 57 (6): 733-747 (2008)A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction., , и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 252-267. Springer, (2006)Traceable Scheme of Public Key Encryption with Equality Test., , , и . Entropy, 24 (3): 309 (2022)Minmizing service span with batch-position-based learning effects., , , и . Optim. Lett., 15 (2): 553-567 (2021)