From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AAIA: an efficient aggregation scheme against inverting attack for federated learning., , , , , и . Int. J. Inf. Sec., 22 (4): 919-930 (2023)Security services provision for telematic services at the knowledge and information society., , , , , , , und . EATIS, Seite 41. (2007)A Proposal for an Internet of Things-based Monitoring System Composed by Low Capability, Open Source and Open Hardware Devices., , , und . SENSORNETS, Seite 87-94. SciTePress, (2014)Security Framework for DPWS Compliant Devices., , , , , und . SECURWARE, Seite 87-92. IEEE Computer Society, (2009)Security Threats in Network Coding-Enabled Mobile Small Cells., , , , und . BROADNETS, Volume 263 von Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Seite 337-346. Springer, (2018)Integration of wearable devices in a wireless sensor network for an E-health application., , , und . IEEE Wirel. Commun., (2013)Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing., , , , und . MSN, Seite 791-796. IEEE, (2020)Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things., , und . Sensors, 14 (12): 22737-22753 (2014)Intensity normalization of sidescan sonar imagery., , , , , , , , , und . IPTA, Seite 1-6. IEEE, (2016)Usage of VR Headsets for Rehabilitation Exergames., , , und . IWBBIO (2), Volume 10209 von Lecture Notes in Computer Science, Seite 434-442. (2017)