From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hunting abnormal configurations for permission-sensitive role mining., , , , и . MILCOM, стр. 1004-1009. IEEE, (2016)A Hybrid Particle Swarm Optimization for Feed-Forward Neural Network Training., и . ICIC (2), том 5227 из Lecture Notes in Computer Science, стр. 494-501. Springer, (2008)Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster., , , и . CNS, стр. 1-2. IEEE, (2020)Bifurcation Analysis of a Nfde Arising from Multiple-Delay Feedback Control., и . Int. J. Bifurc. Chaos, 21 (3): 759-774 (2011)A Novel Hybrid Bacterial Foraging Optimization Algorithm Based on Reinforcement Learning., , , и . ICIC (3), том 12465 из Lecture Notes in Computer Science, стр. 567-578. Springer, (2020)Method and Implementation of a Bioinspired Polarization-Based Attitude and Heading Reference System by Integration of Polarization Compass and Inertial Sensors., , , , и . IEEE Trans. Ind. Electron., 67 (11): 9802-9812 (2020)Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks., , , , , и . IEEE Trans. Mob. Comput., 21 (1): 125-138 (2022)Open Set Domain Adaptation via Instance Affinity Metric and Fine-Grained Alignment for Remote Sensing Scene Classification., , , , и . IEEE Geosci. Remote. Sens. Lett., (2023)Hopf bifurcation induced by neutral delay in a predator-prey System., и . Int. J. Bifurc. Chaos, (2013)Command filter-based adaptive neural finite-time control for stochastic nonlinear systems with time-varying full-state constraints and asymmetric input saturation., , , , и . Int. J. Syst. Sci., 53 (1): 199-221 (2022)