From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks., , , , и . IEEE Trans. Veh. Technol., 69 (6): 5773-5783 (2020)Online combinatorial double auction for mobile cloud computing markets., , , , , и . IPCCC, стр. 1-8. IEEE Computer Society, (2014)A measurement study on multi-path TCP with multiple cellular carriers on high speed rails., , , , , , , , и . SIGCOMM, стр. 161-175. ACM, (2018)Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis., , , и . CCS, стр. 3431-3446. ACM, (2021)Towards Balanced Active Learning for Multimodal Classification., , , , , и . ACM Multimedia, стр. 3434-3445. ACM, (2023)Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes., , , , , и . ICDCS Workshops, стр. 7-12. IEEE, (2022)Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic., , и . ICPCSEE (2), том 1629 из Communications in Computer and Information Science, стр. 33-46. Springer, (2022)Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis., , , и . SPDE, том 1268 из Communications in Computer and Information Science, стр. 661-675. Springer, (2020)UniS-MMC: Multimodal Classification via Unimodality-supervised Multimodal Contrastive Learning., , , , , и . ACL (Findings), стр. 659-672. Association for Computational Linguistics, (2023)Online and automatic identification and mining of encryption network behavior in big data environment., , , и . J. Intell. Fuzzy Syst., 34 (2): 1111-1119 (2018)