From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Location-restricted Services Access Control Leveraging Pinpoint Waveforming., , , и . ACM Conference on Computer and Communications Security, стр. 292-303. ACM, (2015)Fractional Fourier transform based auditory feature for language identification., , , и . APCCAS, стр. 209-212. IEEE, (2008)Yoyo trick on type-II generalised Feistel networks., и . IET Inf. Secur., 15 (6): 457-471 (2021)Block coordinate descentwith time perturbation for nonconvex nonsmooth problems in real-world studies., , , , и . Frontiers Inf. Technol. Electron. Eng., 20 (10): 1390-1403 (2019)IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification., , , , и . DySPAN, стр. 280-287. IEEE, (2021)Jetto: Using Lateral Force Feedback for Smartwatch Interactions., , , , , , , , , и . CHI, стр. 426. ACM, (2018)Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic., , , и . GlobalSIP, стр. 1-5. IEEE, (2019)A Hybrid Short-Term Load Forecasting Model Based on Improved Fuzzy C-Means Clustering, Random Forest and Deep Neural Networks., , , и . IEEE Access, (2021)Research on Detection and Correction of High-Speed Train Idling and Skidding Based on Improved Fuzzy Neural Network., , и . Autom. Control. Comput. Sci., 58 (3): 274-288 (июня 2024)Computing Minimal Persistent Cycles: Polynomial and Hard Cases., , и . SODA, стр. 2587-2606. SIAM, (2020)