From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization., и . IEEE Trans. Inf. Forensics Secur., 1 (4): 440-456 (2006)Fair collusion attacks on scalable video fingerprinting systems., и . ICASSP (2), стр. 1045-1048. IEEE, (2005)Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics., , и . ICIP (6), стр. 109-112. IEEE, (2007)Contour approximation & depth image coding for virtual view synthesis., , , , и . MMSP, стр. 1-6. IEEE, (2015)Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling., , , и . INFOCOM, стр. 307-315. IEEE, (2015)Modeling Viral Information Spreading via Directed Acyclic Graph Diffusion., , , , и . GLOBECOM, стр. 1179-1184. IEEE, (2023)An Evolutionary Game Theoretical Framework for Decision Fusion in the Presence of Byzantines., , , и . APSIPA, стр. 161-169. IEEE, (2020)Iterative Double-Auction-Based Power Allocation in Multiuser Cooperative Networks., , и . IEEE Trans. Vehicular Technology, 64 (9): 4298-4303 (2015)Predicting success or failure of brace treatment for adolescents with idiopathic scoliosis., , , , , , , , , и . Medical Biol. Eng. Comput., 53 (10): 1001-1009 (2015)Time-sensitive behavior dynamics in multimedia fingerprinting social networks., , и . ICASSP, стр. 1465-1468. IEEE, (2009)