From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data-Driven-Based Distributed Fuzzy Tracking Control for Nonlinear MASs Under DoS Attacks., , , , , и . IEEE Trans. Fuzzy Syst., 32 (1): 53-63 (января 2024)GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security., , , , , и . DSC, стр. 203-210. IEEE, (2021)Energy-efficient and coverage-specific node scheduling for wireless sensor networks., , , и . MSWiM, стр. 368-375. ACM, (2010)A network threat analysis method combined with kernel PCA and LSTM-RNN., , и . ICACI, стр. 508-513. IEEE, (2018)CovLets: A Second-Order Descriptor for Modeling Multiple Features., , , , и . ACM Trans. Multim. Comput. Commun. Appl., 16 (1s): 21:1-21:14 (2020)Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment., , , , , и . SEKE, стр. 499-504. KSI Research Inc., (2023)A Resilient Economic Dispatch Method for Power Grid under DoS Attacks., , и . IECON, стр. 1-6. IEEE, (2022)Deep Learning Based Attribute Classification Insider Threat Detection for Data Security., , , и . DSC, стр. 576-581. IEEE, (2018)Adaptive CNN-Based Image Compression Model for Improved Remote Desktop Experience., , , , , и . ICONIP (8), том 1962 из Communications in Computer and Information Science, стр. 37-52. Springer, (2023)Wireless Protocol Secure Injection Testing Method Based on Time Selection., , и . RVSP, стр. 138-142. IEEE Computer Society, (2015)