From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices., , и . Proc. Priv. Enhancing Technol., 2022 (2): 578-600 (2022)A Scalable and Privacy-Aware IoT Service for Live Video Analytics., , , , , и . MMSys, стр. 38-49. ACM, (2017)Evolving Multilayer Neural Networks Using Permutation free Encoding Technique., и . IC-AI, стр. 32-38. CSREA Press, (2009)Securing Anonymous Communication Channels under the Selective DoS Attack., и . Financial Cryptography, том 7859 из Lecture Notes in Computer Science, стр. 362-370. Springer, (2013)A Functional (Monadic) Second-Order Theory of Infinite Trees., и . CoRR, (2019)A proof theory of right-linear (omega-)grammars via cyclic proofs., и . CoRR, (2024)Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice., , , и . IEEE Pervasive Comput., 17 (3): 35-46 (2018)Deep Learning with Game Theory Assisted Vertical Handover Optimization in a Heterogeneous Network., , , , , , и . Int. J. Artif. Intell. Tools, 32 (4): 2350012:1-2350012:33 (июня 2023)Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization-based cluster head selection.. Trans. Emerg. Telecommun. Technol., (2022)Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR., , и . CoRR, (2024)