From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options., , , , и . Digit. Signal Process., (2018)Secret image sharing with separate shadow authentication ability., , , , , и . Signal Process. Image Commun., (2020)Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy., , , , и . BigDataSecurity/HPSC/IDS, стр. 26-31. IEEE, (2017)Centroid-Based Audio Steganography Scheme in Wavelet Domain., , , , , и . J. Inf. Hiding Multim. Signal Process., 9 (5): 1222-1232 (2018)DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design., , , , , и . ICCCS, стр. 476-480. IEEE, (2022)A Cybersecurity Knowledge Graph Completion Method for Scalable Scenarios., , , и . KSEM (4), том 14120 из Lecture Notes in Computer Science, стр. 83-98. Springer, (2023)VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM., , , и . IPTC, стр. 169-172. IEEE Computer Society, (2011)Research on Network Security Issues from the Perspective of Multilayer Networks., , , и . DSIT, стр. 92-97. ACM, (2021)A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training., и . ICCPR, стр. 255-259. ACM, (2023)PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains., , , и . ICIC (9), том 14870 из Lecture Notes in Computer Science, стр. 220-232. Springer, (2024)