From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Prediction With System-Call Sequence-to-Sequence Model., , , и . IEEE Access, (2018)AppQ: Warm-starting App Recommendation Based on View Graphs., , , , , и . CoRR, (2021)Blockchain-based decentralized federated learning: A secure and privacy-preserving system., , , , , , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 941-948. IEEE, (2021)Alexa Skills: Security Vulnerabilities and Countermeasures., , , , и . CNS, стр. 1-9. IEEE, (2022)Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks., , , , , , , и . ISSREW, стр. 214-221. IEEE, (2023)Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles., , и . BigCom, стр. 14-21. IEEE, (2021)Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System., , , , и . ICPADS, стр. 667-672. IEEE, (2020)Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness., , , , и . ICPADS, стр. 217-225. IEEE, (2022)Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts., , , и . ICC, стр. 1835-1839. IEEE, (2008)OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines., , , и . Concurr. Comput. Pract. Exp., 27 (5): 1092-1109 (2015)