From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remarks on the Industrial Application of Inductive Database Technologies., , и . Constraint-Based Mining and Inductive Databases, том 3848 из Lecture Notes in Computer Science, стр. 196-215. Springer, (2004)Comprehensive Log Compression with Frequent Patterns., , , , и . DaWaK, том 2737 из Lecture Notes in Computer Science, стр. 360-370. Springer, (2003)Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities., , , и . PIMRC, стр. 1-4. IEEE, (2007)Digital contact Tracing solutions: Promises, Pitfalls and Challenges., , , , и . ArXiv I arXiv 2202.06698v2 (October 2022), (октября 2022)Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants., , и . AsiaCCS, стр. 465-478. ACM, (2019)Coiled-Coils in Phage Display Screening: Insight into Exceptional Selectivity Provided by Molecular Dynamics., , , , , , , , и . J. Chem. Inf. Model., 55 (3): 495-500 (2015)Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic., , и . MTD@CCS, стр. 1-9. ACM, (2020)DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection., , , и . NDSS, The Internet Society, (2022)DÏoT: A Federated Self-learning Anomaly Detection System for IoT., , , , , и . ICDCS, стр. 756-767. IEEE, (2019)Using context-profiling to aid access control decisions in mobile devices., , и . PerCom Workshops, стр. 310-312. IEEE Computer Society, (2011)