From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Information Hiding Technique for Remote Sensing Image., , и . ADMA, том 3584 из Lecture Notes in Computer Science, стр. 423-430. Springer, (2005)Design and Experiments of Electromagnetic Heating Forming Technology., , , , , , , , , и . IEEE Access, (2019)Landslide Susceptibility Analysis Based on Data Field., и . J. Softw., 6 (1): 108-115 (2011)An effective and practical gradient inversion attack., , , , , и . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)DE-RSTC: A rational secure two-party computation protocol based on direction entropy., , , , и . Int. J. Intell. Syst., 37 (11): 8947-8967 (2022)Feature evolvable learning with image streams., , , , и . Intell. Data Anal., 27 (4): 1047-1063 (2023)Adversarial attacks on deep-learning-based SAR image target recognition., , , , , и . J. Netw. Comput. Appl., (2020)A near-optimal multiuser detector for DS-CDMA systems using semidefinite programming relaxation., , и . IEEE Trans. Signal Process., 51 (9): 2446-2450 (2003)Experimental Evaluation of Transformer Internal Fault Detection Based on V-I Characteristics., , , , , , и . IEEE Trans. Ind. Electron., 67 (5): 4108-4119 (2020)Designing Fuzzy Sets With the Use of the Parametric Principle of Justifiable Granularity., и . IEEE Trans. Fuzzy Syst., 24 (2): 489-496 (2016)