From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Verifying Internet of Things Safety and Security in Physical Spaces., , , , и . IEEE Secur. Priv., 17 (5): 30-37 (2019)Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities., , , , и . CoRR, (2018)CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis., , , , , , и . IET Inf. Secur., 17 (4): 582-597 (июля 2023)PPMCK: Privacy-preserving multi-party computing for K-means clustering., , , , , , , и . J. Parallel Distributed Comput., (2021)Prioritizing data flows and sinks for app security transformation., , , и . Comput. Secur., (2020)Markup SVG - An Online Content-Aware Image Abstraction and Annotation Tool., , и . IEEE Trans. Multim., 13 (5): 993-1006 (2011)Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities., , , , и . ACM Comput. Surv., 52 (4): 74:1-74:30 (2019)Privacy preserving based logistic regression on big data., , , , , , и . J. Netw. Comput. Appl., (2020)Principles and Implementation Techniques of Software-Based Fault Isolation.. Found. Trends Priv. Secur., 1 (3): 137-198 (2017)FairLay-ML: Intuitive Remedies for Unfairness in Data-Driven Social-Critical Algorithms., , и . CoRR, (2023)