From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evolution of cooperation in malicious social networks with differential privacy mechanisms., , , , и . Neural Comput. Appl., 35 (18): 12979-12994 (июня 2023)A solution for fault tolerance in replicated database systems., и . Int. J. Comput. Sci. Eng., 2 (1/2): 64-71 (2006)Cultural Issues in Online Learning - Is Blended Learning a Possible Solution?, и . Int. J. Comput. Process. Orient. Lang., 16 (4): 275-292 (2003)Modeling Propagation Dynamics of Social Network Worms., , , , , и . IEEE Trans. Parallel Distributed Syst., 24 (8): 1633-1643 (2013)More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design., , , , и . ACM Comput. Surv., 54 (7): 136:1-136:37 (2022)Machine Unlearning: A Survey., , , , и . ACM Comput. Surv., 56 (1): 9:1-9:36 (января 2024)Fairness and privacy preservation for facial images: GAN-based methods., , и . Comput. Secur., (2022)Detection and defense of application-layer DDoS attacks in backbone web traffic., , , , и . Future Gener. Comput. Syst., (2014)A rapid prototyping system for distributed information system applications.. J. Syst. Softw., 24 (1): 3-29 (1994)A two-stage model extraction attack on GANs with a small collected dataset., , , и . Comput. Secur., (февраля 2024)