From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Advance on Trust Model and Evaluation Method in Social Networks., , , и . ICGEC, стр. 9-14. IEEE, (2012)ACO based key management routing mechanism for WSN security and data collection., , и . ICIT, стр. 1935-1939. IEEE, (2018)A crowdsourcing method for online social networks security assessment based on human-centric computing., , , , и . Hum. centric Comput. Inf. Sci., (2020)CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution., , , , и . IEEE Trans. Knowl. Data Eng., 35 (6): 5695-5709 (июня 2023)Spatiotemporal implicit neural representation for unsupervised dynamic MRI reconstruction., , , , , и . CoRR, (2023)Security, Trust and Risk in Multimedia Social Networks.. Comput. J., 58 (4): 515-517 (2015)Lightweight Bimodal Rail Surface Defect Detection Method: Parallel-YOLOv4-Tiny., , , , , , и . ICVIP, стр. 98-103. ACM, (2021)GCRNet: Global Context Relation Network for Weakly-Supervised Temporal Action Localization: Identify the target actions in a long untrimmed video and find the corresponding action start point and end point., , , , и . ICVIP, стр. 184-190. ACM, (2021)Combine Object Detection with Skeleton-Based Action Recognition to Detect Smoking Behavior., , , , , , , и . ICVIP, стр. 111-116. ACM, (2021)Learning-Based Network Boolean Tomography for Identifying Congested Links with Correlations., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2020)