From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Combating Good Point Set Scanning-based Self-learning Worms by Using Predators., , , и . Int. J. Netw. Secur., 15 (3): 171-178 (2013)Predators Combat Good Point Set Scanning-Based Self-Learning Worms., , , и . CIS (1), стр. 418-422. IEEE Computer Society, (2009)Self-attention is What You Need to Fool a Speaker Recognition System., , , , , и . TrustCom, стр. 929-936. IEEE, (2023)Combating self-learning worms by using predators., , , и . WCNIS, стр. 607-611. IEEE, (2010)The Research of Security Technology in the Internet of Things., и . CSISE (2), том 105 из Advances in Intelligent and Soft Computing, стр. 113-119. Springer, (2011)A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method., , , , и . DSC, стр. 1-8. IEEE, (2022)MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer., , , , , , и . J. Inf. Secur. Appl., (2024)A Probability Mapping-Based Privacy Preservation Method for Social Networks., , , , и . UbiSec, том 2034 из Communications in Computer and Information Science, стр. 289-303. Springer, (2023)Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation., , , , и . IEEE Trans. Emerg. Top. Comput., 12 (1): 307-315 (января 2024)Analysis of SVEIR worm attack model with saturated incidence and partial immunization., , , и . J. Comm. Inform. Networks, 1 (4): 105-115 (2016)