From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks., , , и . KSII Trans. Internet Inf. Syst., 8 (1): 1-17 (2014)Group Consensus in Finite Time for Fractional Multiagent Systems With Discontinuous Inherent Dynamics Subject to Hölder Growth., , и . IEEE Trans. Cybern., 52 (6): 4161-4172 (2022)Generating Chaos with Saddle-Focus Homoclinic Orbit., , и . Int. J. Bifurc. Chaos, 34 (1): 2450011:1-2450011:12 (января 2024)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved., , , , и . IEEE Internet Things J., 6 (2): 1606-1616 (2019)On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain., , , и . Axioms, 11 (6): 278 (2022)Construction of Near-Complementary Sequences with Low PMEPR for Peak Power Control in OFDM., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (11): 1881-1887 (2012)Modeling and Simulation of Circuit-Level Nonidealities for an Analog Computing Design Approach With Application to EEG Feature Extraction., , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (1): 229-242 (2023)A simple and robust anonymous two-factor authenticated key exchange protocol., и . Secur. Commun. Networks, 6 (6): 711-722 (2013)Efficient quantum dialogue using entangled states and entanglement swapping without information leakage., , , и . Quantum Inf. Process., 15 (6): 2593-2603 (2016)The Analysis of Peer-to-Peer Network Security., и . GCA, стр. 131-150. CSREA Press, (2005)