From post

Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network.

, , , , , , и . IEEE J. Biomed. Health Informatics, 26 (12): 5783-5792 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Static malware clustering using enhanced deep embedding method., , , и . Concurr. Comput. Pract. Exp., (2019)PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data., , , , , , и . IEEE Trans. Cloud Comput., 11 (3): 2379-2391 (июля 2023)Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions., , , и . COMSNETS, стр. 31-36. IEEE, (2024)Towards Privacy-Preserving Neural Architecture Search., , , , и . ISCC, стр. 1-6. IEEE, (2022)PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples., , , , , , , и . AAAI, стр. 872-880. AAAI Press, (2023)Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks., , , , , , и . AAAI, стр. 6404-6412. AAAI Press, (2024)Shielding Federated Learning: A New Attack Approach and Its Defense., , , , и . WCNC, стр. 1-7. IEEE, (2021)LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks., , , , , и . AsiaCCS, стр. 122-135. ACM, (2023)Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning., , , , и . TrustCom, стр. 139-146. IEEE, (2022)Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem., , , и . Signal Process. Image Commun., 29 (8): 914-920 (2014)