From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Chaotic Image Encryption Scheme Based on Hénon-Chebyshev Modulation Map and Genetic Operations., , , и . Int. J. Bifurc. Chaos, 30 (6): 2050090:1-2050090:22 (2020)Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation., , , , и . Comput. Secur., (2020)Privacy Protection and Secure Transmission of Smart Meter Data., , , , и . ISMICT, стр. 173-178. IEEE, (2021)3D Aerial Vehicle Base Station (UAV-BS) Position Planning based on Deep Q-Learning for Capacity Enhancement of Users With Different QoS Requirements., , , , , , и . IWCMC, стр. 1508-1512. IEEE, (2019)On the preferences of quality indicators for multi-objective search algorithms in search-based software engineering., , , , и . Empir. Softw. Eng., 27 (6): 144 (2022)MagicPhone: pointing & interacting., , , , и . UbiComp (Adjunct Papers), стр. 451-452. ACM, (2010)Predicting Perceived Level of Cycling Safety for Cycling Trips., , и . SIGSPATIAL/GIS, стр. 456-459. ACM, (2019)Reality Bites: Assessing the Realism of Driving Scenarios with Large Language Models., , , , и . FORGE, стр. 40-51. ACM, (2024)SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing., , , , , и . IEEE Trans. Cloud Comput., 10 (1): 691-705 (2022)Local attention and long-distance interaction of rPPG for deepfake detection., , , , и . Vis. Comput., 40 (2): 1083-1094 (февраля 2024)