From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network., , , и . PIMRC, стр. 2265-2269. IEEE, (2009)Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 98-107. Springer, (2011)Access control protocols with two-layer architecture for wireless networks., , , и . Comput. Networks, 51 (3): 655-670 (2007)Security analysis on a conference scheme for mobile communications., , , и . IEEE Trans. Wirel. Commun., 5 (6): 1238-1240 (2006)Semi-supervised cross-modal hashing via modality-specific and cross-modal graph convolutional networks., , , , , и . Pattern Recognit., (апреля 2023)Multi-Level Confidence Learning for Trustworthy Multimodal Classification., , , , и . AAAI, стр. 11381-11389. AAAI Press, (2023)An Efficient and Secure Scheme of Verifiable Computation for Intel SGX., , , , и . TrustCom, стр. 473-482. IEEE, (2022)Stability analyses of longest-queue-first link scheduling in MC-MR wireless networks., , , , и . MobiHoc, стр. 45-54. ACM, (2012)Assure High Quality Code Using Refactoring and Obfuscation Techniques., , , и . FCST, стр. 246-252. IEEE Computer Society, (2010)Intelligent Computing: The Latest Advances, Challenges and Future., , , , , , , , , и 11 other автор(ы). CoRR, (2022)