From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A robust low-overhead watermarking for field authentication of intellectual property cores., , , , и . Comput. Sci. Inf. Syst., 13 (2): 609-622 (2016)An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters., и . J. Softw., 8 (8): 2080-2086 (2013)A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search., , , и . TrustCom/BigDataSE/ISPA (1), стр. 1298-1305. IEEE, (2015)Automatic Chinese Personality Recognition Based on Prosodic Features., , , и . MMM (1), том 8935 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2015)A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value., , , и . J. Sensors, (2015)Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model., , , , и . ICIOT, стр. 97-104. IEEE Computer Society, (2017)A Detection and Classification Method of Asphalt Pavement Crack based on Vision Transformer., , , и . ICBAR, стр. 1125-1131. ACM, (2023)Sparse Code Multiple Access with Index Modulation., и . ICCC, стр. 1314-1318. IEEE, (2020)Det2Seg: A Two-Stage Approach for Road Object Segmentation from 3D Point Clouds., , , , и . VCIP, стр. 1-4. IEEE, (2019)Research of Cesium Adsorption on Mo and Ni Based on Temperature-Controlled Quartz Microbalance., , , , , и . IEEE Trans. Instrum. Meas., (2024)