From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Virtual resource allocation for heterogeneous services in full duplex-enabled small cell networks with cache and MEC., , , , и . INFOCOM Workshops, стр. 163-168. IEEE, (2017)Joint Resource Allocation in Cache-Enabled Small Cell Networks with Massive MIMO and Full Duplex., , , , и . GLOBECOM, стр. 1-6. IEEE, (2017)An Omnidirectional Approach to Touch-based Continuous Authentication., , , и . CoRR, (2023)Deep Learning in Mobile Computing: Architecture, Applications, and Future Challenges., , и . Mob. Inf. Syst., (2021)Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment., , , , , , и . IEEE Internet Things J., 8 (5): 3211-3223 (2021)An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay., , , и . Trustcom/BigDataSE/ISPA, стр. 178-184. IEEE, (2016)Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection., , , , и . TrustCom, стр. 33-40. IEEE Computer Society, (2012)TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication., , , и . TrustCom, стр. 788-795. IEEE, (2023)Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites., , и . EvoApplications, том 12104 из Lecture Notes in Computer Science, стр. 117-132. Springer, (2020)A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs., , и . LOD (2), том 13811 из Lecture Notes in Computer Science, стр. 32-46. Springer, (2022)