From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Access Control Model Based on Role and Attribute and Its Implementation., , , , , и . CyberC, стр. 66-71. IEEE, (2016)Image encryption based on quantum-CNN hyperchaos system and Anamorphic Fractional Fourier Transform., , , и . CISP-BMEI, стр. 1-6. IEEE, (2017)Android Vault Application Behavior Analysis and Detection., , , и . ICPCSEE (1), том 1257 из Communications in Computer and Information Science, стр. 428-439. Springer, (2020)IoV-BCFL: An intrusion detection method for IoV based on blockchain and federated learning., , , , и . Ad Hoc Networks, (2024)Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels., , , , и . IET Image Process., 16 (10): 2769-2790 (2022)Medical image encryption scheme based on self-verification matrix., , и . IET Image Process., 15 (12): 2787-2798 (2021)A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks., , , , , , , и . J. Adv. Comput. Intell. Intell. Informatics, 23 (5): 898-908 (2019)QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity., , , , , и . TrustCom, стр. 1085-1092. IEEE, (2021)Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective., , , , , и . ICA3PP (1), том 13155 из Lecture Notes in Computer Science, стр. 402-421. Springer, (2021)MPQUIC Transmission Control Strategy for SDN-Based Satellite Network., , , , и . ICA3PP (6), том 14492 из Lecture Notes in Computer Science, стр. 453-464. Springer, (2023)