From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Deep Learning to Detect Digitally Encoded DNA Trigger for Trojan Malware in Bio-Cyber Attacks., , , , , , , и . CoRR, (2022)Joint delay and energy model for IEEE 802.11 networks., , и . Wireless Networks, 20 (5): 1121-1132 (2014)Leveraging Fog Analytics for Context-Aware Sensing in Cooperative Wireless Sensor Networks., , , и . ACM Trans. Sens. Networks, 15 (2): 23:1-23:35 (2019)Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks., , и . AINA, стр. 541-547. IEEE Computer Society, (2010)Trojan Bio-Hacking of DNA-Sequencing Pipeline., , , , , , и . NANOCOM, стр. 18:1-18:7. ACM, (2019)Gravity gradient routing for information delivery in fog Wireless Sensor Networks., , , и . Ad Hoc Networks, (2016)Fog-enabled WSN system for animal behavior analysis in precision dairy., , , и . ICNC, стр. 504-510. IEEE Computer Society, (2017)Fog-centric localization for ambient assisted living., , и . ICE/ITMC, стр. 1424-1430. IEEE, (2017)Enzyme-based circuit design for nano-scale computing., , и . Nano Commun. Networks, 3 (3): 168-174 (2012)Cooperative wireless sensor environments supporting body area networks., , и . IEEE Trans. Consumer Electronics, 58 (2): 284-292 (2012)