From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding and Constructing Latent Modality Structures in Multi-Modal Representation Learning., , , , , , , , и . CVPR, стр. 7661-7671. IEEE, (2023)Adversarial Perturbation with ResNet., , , , и . ACM Great Lakes Symposium on VLSI, стр. 549-554. ACM, (2020)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , и . J. Parallel Distributed Comput., (2019)Symmetric Variational Autoencoder and Connections to Adversarial Learning., , , , , и . CoRR, (2017)On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model., , , , , и . Comput. J., 63 (8): 1259-1262 (2020)A DAA Scheme Requiring Less TPM Resources.. IACR Cryptol. ePrint Arch., (2010)Hash-Based Direct Anonymous Attestation., , , , и . PQCrypto, том 14154 из Lecture Notes in Computer Science, стр. 565-600. Springer, (2023)07421 Executive Summary -- Formal Protocol Verification Applied., , и . Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Interactive Teaching Reform for "Principles of Automatic Control" Course Based on Professional Cases., , , , и . EDUCON, стр. 1-5. IEEE, (2023)DRoT: A Decentralised Root of Trust for Trusted Networks., , , , , и . ICICS, том 14252 из Lecture Notes in Computer Science, стр. 683-701. Springer, (2023)