From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting., , , , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 211-223. Springer, (2010)A Dynamic Scheme For Authenticated Group Key Agreement Protocol., , , и . TeNe, стр. 245-250. Springer, (2008)KCC Method: Unknown Intrusion Detection Based on Open Set Recognition., , , и . ICTAI, стр. 1343-1347. IEEE, (2021)Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV., , , и . ICC Workshops, стр. 1-7. IEEE, (2021)An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink., , и . ICC, стр. 872-877. IEEE, (2006)A neighborhood vector propagation algorithm for community detection., , и . GLOBECOM, стр. 2923-2928. IEEE, (2014)Power allocation over two identical Gilbert-Elliott channels., , и . ICC, стр. 5888-5892. IEEE, (2013)Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks., , и . IAS, стр. 155-160. IEEE, (2010)Towards High Transferability on Neural Network for Black-Box Adversarial Attacks., , , и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 72-88. Springer, (2022)Channel aware resource allocation for device-to-device communication underlaying cellular networks., , , , и . SSIC, стр. 1-5. IEEE, (2016)