From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model., , и . MIS Q., 46 (2): 911-946 (мая 2022)Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression., , , , , , и . IEEE Trans. Knowl. Data Eng., 35 (12): 12400-12414 (декабря 2023)An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (4): 3037-3050 (июля 2023)Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data., , , , и . ICDH, стр. 115-117. IEEE, (2023)Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach., , , , , , , , и . ICDM (Workshops), стр. 488-495. IEEE, (2020)Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence., , и . Inf. Syst. Frontiers, 25 (2): 425-429 (апреля 2023)Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach., , , и . ISI, стр. 1-6. IEEE, (2023)Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach., , , и . HICSS, стр. 548-556. ScholarSpace, (2024)ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense., , , , , и . KDD, стр. 4900-4901. ACM, (2022)Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence., , , и . ISI, стр. 13-18. IEEE, (2017)