From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extracting semantic event information from distributed sensing devices using fuzzy sets., , , , и . Fuzzy Sets Syst., (2018)Smartphone-based activity recognition independent of device orientation and placement., , , и . Int. J. Commun. Syst., 29 (16): 2403-2415 (2016)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , и . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)Mining cell-id trajectory patterns by exploiting handoff features., , , и . UbiComp Adjunct, стр. 153-156. ACM, (2016)An Interpretable Orientation and Placement Invariant Approach for Smartphone Based Activity Recognition., , , и . UIC/ATC/ScalCom, стр. 143-150. IEEE Computer Society, (2015)Detecting traffic congestions using cell phone accelerometers., , , и . UbiComp Adjunct, стр. 107-110. ACM, (2014)TCFP: A Novel Privacy-Aware Edge Vehicular Trajectory Compression Scheme Using Fuzzy Markovian Prediction., , , , , и . SMC, стр. 1217-1223. IEEE, (2023)Discovering personally semantic places from GPS trajectories., , и . CIKM, стр. 1552-1556. ACM, (2012)EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment., , , , , , , и . IEEE Trans. Mob. Comput., 21 (2): 555-572 (2022)General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis., , , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2021)