From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Network Attack Detection Based on Kernel Principal Component Analysis and Decision Tree., , , и . CyberC, стр. 84-91. IEEE, (2020)Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme., , , и . CISP-BMEI, стр. 1-9. IEEE, (2018)Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs., , , , и . CISP-BMEI, стр. 1-6. IEEE, (2019)Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment Recommendation., , и . DASC/PiCom/DataCom/CyberSciTech, стр. 432-436. IEEE, (2019)The Influence of Target Layout on Dragging Performance Based on Eye-Control Technique., , , , , , , , , и 1 other автор(ы). IHSI, том 903 из Advances in Intelligent Systems and Computing, стр. 265-270. Springer, (2019)Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme., , , и . ICCNS, стр. 12-16. ACM, (2018)A certificateless encryption scheme based on blockchain., , и . Peer-to-Peer Netw. Appl., 14 (5): 2952-2960 (2021)A Congestion Control Protocol for Wireless Sensor Networks.. CSoNet, том 11280 из Lecture Notes in Computer Science, стр. 356-367. Springer, (2018)GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews., , , и . ICC, стр. 1-6. IEEE, (2019)A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks., , и . COMPSAC, стр. 659-664. IEEE Computer Society, (2015)