From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures., , , , , , и . CODASPY, стр. 89-100. ACM, (2021)Enterprise Accounting and Financial Risk Analysis System Based on Decision Tree and SVM., , и . ICISCAE (ACM), стр. 2015-2018. ACM, (2021)Application Value of Artificial Intelligence System in Music Education.. ICISCAE (ACM), стр. 1459-1462. ACM, (2021)Building Extraction Using Mask Scoring R-CNN Network., и . CSAE, стр. 113:1-113:5. ACM, (2019)Design and Characterization of Arbitrary Filters with an Integrated Spiral Si3N4/SiO2 Waveguide., , , , , и . OFC, стр. 1-3. IEEE, (2020)Lower bound on the ergodic capacity of distributed MIMO systems over K fading channels., , , и . ICCC, стр. 1-6. IEEE, (2016)WeakPolyp: You only Look Bounding Box for Polyp Segmentation., , , , и . MICCAI (3), том 14222 из Lecture Notes in Computer Science, стр. 757-766. Springer, (2023)Shallow Attention Network for Polyp Segmentation., , , , , и . MICCAI (1), том 12901 из Lecture Notes in Computer Science, стр. 699-708. Springer, (2021)Towards Inference of Original Graph Data Information from Graph Embeddings., , , , и . IJCNN, стр. 1-10. IEEE, (2023)IMS is Not That Secure on Your 5G/4G Phones., , , , , , , , и . MobiCom, стр. 513-527. ACM, (2024)