From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A streaming-based network monitoring and threat detection system., , , , и . SERA, стр. 31-37. IEEE Computer Society, (2016)Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction., , , , , и . Inf. Sci., (2018)The Research on Control and Dynamic Property of Autonomous Vehicle Adaptive Lidar System., , , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 462-468. IEEE, (2020)KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment., , , и . Intelligent Information Processing, том 538 из IFIP Advances in Information and Communication Technology, стр. 311-320. Springer, (2018)A Framework to Enable Multiple Coexisting Internet of Things Applications., , , , и . ICNC, стр. 637-641. IEEE Computer Society, (2018)On effective data aggregation techniques in Host-based Intrusion Detection in MANET., , , , , и . CCNC, стр. 85-90. IEEE, (2013)Towards Distributed Graph Representation Learning., , , , и . ChineseCSCW (1), том 2012 из Communications in Computer and Information Science, стр. 547-557. Springer, (2023)Optimized verifiable delegated private set intersection on outsourced private datasets., , , , и . Comput. Secur., (2024)Improving query efficiency of black-box attacks via the preference of deep learning models., , , и . Inf. Sci., (2024)Exploring Transformer Backbones for Heterogeneous Treatment Effect Estimation., , , , и . Trans. Mach. Learn. Res., (2023)