From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)., , и . IH&MMSec, стр. 63-68. ACM, (2016)Image Sharing Chain Detection VIA Sequence-To-Sequence Model., , , , , и . ICASSP, стр. 1-5. IEEE, (2023)Meta-Path Based Neighbors for Behavioral Target Generalization in Sequential Recommendation., , , , , , , , и . IEEE Trans. Netw. Sci. Eng., 9 (3): 1658-1667 (2022)Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing., , , и . Signal Process., (2021)Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing., , , , и . CoRR, (2022)Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion., , и . ACM Multimedia, стр. 1063-1066. ACM, (2015)Image Reconstruction from Local Descriptors Using Conditional Adversarial Networks., , и . APSIPA, стр. 1773-1779. IEEE, (2019)Privacy-Preserving distributed deep learning based on secret sharing., , и . Inf. Sci., (2020)Task Scheduling Game Optimization for Mobile Edge Computing., , , , , , и . ICC, стр. 1-6. IEEE, (2021)Synchronous Bi-directional Pedestrian Trajectory Prediction with Error Compensation., , , , и . ACCV (6), том 13846 из Lecture Notes in Computer Science, стр. 699-715. Springer, (2022)