From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation., и . TrustCom/BigDataSE, стр. 723-728. IEEE, (2019)Wireless and Service Allocation for Mobile Computation Offloading with Task Deadlines., , , и . CoRR, (2023)Network security situation assessment based on dual attention mechanism and HHO-ResNeXt., , и . Connect. Sci., (декабря 2023)A versatile roaming service framework with billing support for WLAN/cellular integrated networks., , , и . QSHINE, стр. 38. ACM, (2007)Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database., , , , , и . HCC, том 12634 из Lecture Notes in Computer Science, стр. 319-325. Springer, (2020)Network Security Situation Assessment Method Based on Absorbing Markov Chain., , , , , и . NaNA, стр. 556-561. IEEE, (2022)Network Security Situation Prediction Implemented by Attention and BiLSTM., , и . NaNA, стр. 213-219. IEEE, (2022)Physical Layer Authentication Based on CFO and Visibility Graph., , , и . NaNA, стр. 147-152. IEEE, (2018)Joint Job Partitioning and Collaborative Computation Offloading for Internet of Things., , , и . IEEE Internet of Things Journal, 6 (1): 1046-1059 (2019)Compound Attack Prediction Method Based On Improved Algorithm Of Hidden Markov Model "In Prepress"., , и . J. Web Eng., 19 (7-8): 244-263 (2020)