From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing Mutual Authentication Protocols in Industrial Wireless Network., , , и . ICDIS, стр. 153-158. IEEE, (2018)Assessing transferability of adversarial examples against malware detection classifiers., , и . CF, стр. 211-214. ACM, (2019)Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples., , , , , и . IEEE Access, (2019)SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs., , , , , , , и . IEEE Trans. Comput. Social Systems, 6 (6): 1373-1385 (2019)Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions., , , , , , , и . SocialSec, том 1298 из Communications in Computer and Information Science, стр. 340-354. Springer, (2020)DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse., , , , , и . ICC, стр. 6318-6323. IEEE, (2023)The NiuTrans Machine Translation System for WMT18., , , , , , , , и . WMT (shared task), стр. 528-534. Association for Computational Linguistics, (2018)Experience: Large-scale Cellular Localization for Pickup Position Recommendation at Black-hole., , , , , , , , , и . MobiCom, стр. 84:1-84:15. ACM, (2023)Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples., , , , , , , и . ICPADS, стр. 430-437. IEEE, (2020)Organization structure based access control model., , и . InfoSecu, стр. 210-215. ACM, (2004)