From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A nonlinear and noise-tolerant ZNN model solving for time-varying linear matrix equation., , , и . Neurocomputing, (2018)Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR., , , , и . INFOCOM, стр. 1-9. IEEE, (2017)A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI., , , и . PAMCO@MobiHoc, стр. 43-50. ACM, (2016)Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT., , , и . Wirel. Commun. Mob. Comput., (2021)Distributed Social Learning With Imperfect Information., , , , , и . IEEE Trans. Netw. Sci. Eng., 8 (2): 841-852 (2021)Distributed optimization for intelligent IoT under unstable communication conditions., , , и . Comput. Commun., (февраля 2023)MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors., , , , , и . IEEE Trans. Computers, 73 (4): 980-993 (апреля 2024)Jamming-Resilient Message Dissemination in Wireless Networks., , , , , и . IEEE Trans. Mob. Comput., 22 (3): 1536-1550 (марта 2023)CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA., , , , , и . CoRR, (2021)Privacy-aware Data Trading., , , , и . CoRR, (2020)