From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disguised as Privacy: Data Poisoning Attacks Against Differentially Private Crowdsensing Systems., , , , , и . IEEE Trans. Mob. Comput., 22 (9): 5155-5169 (сентября 2023)Guest Editorial Special Issue on Security for IoT: The State of the Art., , , , и . IEEE Internet Things J., 1 (5): 369-371 (2014)Unique Determination of Absorption Coefficients in a Semilinear Transport Equation., и . SIAM J. Math. Anal., 53 (5): 5158-5184 (2021)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1102-1116 (2021)Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level., , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1063-1076 (2021)TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints., , , , , , , и . IEEE/ACM Trans. Netw., 27 (4): 1612-1628 (2019)What's (Not) Validating Network Paths: A Survey., , , , , и . CoRR, (2018)Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection., , , , , , , и . CoRR, (2018)Towards Data Poisoning Attack against Knowledge Graph Embedding., , , , , , и . CoRR, (2019)