From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ELAMD: An ensemble learning framework for adversarial malware defense., , , , , и . J. Inf. Secur. Appl., (июня 2023)MSYM: A multichannel communication system for android devices., , , , , и . Comput. Networks, (2020)An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification., , , и . SEC, том 648 из IFIP Advances in Information and Communication Technology, стр. 507-523. Springer, (2022)Non-transferable blockchain-based identity authentication., , , , , , , и . Peer Peer Netw. Appl., 16 (3): 1354-1364 (мая 2023)Towards service continuity for transactional applications via diverse device drivers., , и . Int. J. Inf. Comput. Secur., 8 (4): 382-400 (2016)EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX., , , , , и . RAID, стр. 195-208. USENIX Association, (2020)CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy., , , и . CIT, стр. 1299-1305. IEEE Computer Society, (2010)SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation., , , , , и . ACSAC, стр. 939-950. ACM, (2020)Value-based program characterization and its application to software plagiarism detection., , , , , и . ICSE, стр. 756-765. ACM, (2011)CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds., , , и . WASA, том 10251 из Lecture Notes in Computer Science, стр. 665-677. Springer, (2017)