From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chapter One - A Deep-forest based approach for detecting fraudulent online transaction., , , , , и . Adv. Comput., (2021)An Adaptive Data Placement Architecture in Multicloud Environments., , , , и . Sci. Program., (2020)A General Construction for 1-Round δ-RMT and (0, δ)-SMT., , и . ACNS, том 7341 из Lecture Notes in Computer Science, стр. 344-362. Springer, (2012)Integrating Local Vertex/Edge Embedding via Deep Matrix Fusion and Siamese Multi-label Classification., , , , , и . IEEE BigData, стр. 1018-1027. IEEE, (2019)Semi-supervised Classification-based Local Vertex Ranking via Dual Generative Adversarial Nets., , , , , , и . IEEE BigData, стр. 1267-1273. IEEE, (2019)Forensics in the Cloud: A Literature Analysis and Classification., , , и . BigCom, стр. 124-132. IEEE, (2019)An efficient code for Adversarial Wiretap channel., и . ITW, стр. 40-44. IEEE, (2014)A Situation Analysis Method for Specific Domain Based on Multi-source Data Fusion., , и . ICIC (1), том 10954 из Lecture Notes in Computer Science, стр. 160-171. Springer, (2018)Efficient codes for Limited View adversarial channels., и . CNS, стр. 215-223. IEEE, (2013)Interactive message transmission over adversarial wiretap channel II., и . INFOCOM, стр. 1-9. IEEE, (2017)