From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast Fourier Transform Based Data Perturbation Method for Privacy Protection., и . ISI, стр. 221-224. IEEE, (2007)Privacy preserving churn prediction., , и . SAC, стр. 1610-1614. ACM, (2009)Information Security Training Customized by Risk Profile., , и . AMCIS, Association for Information Systems, (2016)Review of control models for human pilot behavior., , , , и . Annu. Rev. Control., (2017)A course-based undergraduate research experience project in information security., , , , и . ACM Southeast Regional Conference, стр. 206-210. ACM, (2022)Modeling Human Pilot Behavior for Aircraft With a Smart Inceptor., , и . IEEE Trans. Hum. Mach. Syst., 49 (6): 661-671 (2019)On periodic scheduling of fixed-slot bandwidth reservations for big data transfer., , , , , и . LCN, стр. 587-594. IEEE Computer Society, (2015)Identify Disease-Associated MiRNA-miRNA Pairs Through Deep Tensor Factorization and Semi-supervised Learning., , и . ICANN (8), том 15023 из Lecture Notes in Computer Science, стр. 71-86. Springer, (2024)An Autoencoder Based Insider Attack Detection in Imbalanced Data., , , и . AMCIS, Association for Information Systems, (2020)Integrating HCI in Web Technologies Course., и . SIGITE, стр. 164-168. ACM, (2023)