From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques., и . CoRR, (2018)Flexible Commit Protocols for Advanced Transaction Processing., , , и . Advanced Transaction Models and Architectures, (1997)The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks., , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 85-96. Springer, (2009)Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN., , , и . SecureComm, том 19 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 265-284. Springer, (2009)Obfuscation of sensitive data in network flows., , , , и . INFOCOM, стр. 2372-2380. IEEE, (2012)Hierarchies of keys in secure multicast communications., , и . Journal of Computer Security, 18 (5): 839-860 (2010)Distributed data source verification in wireless sensor networks., , , и . Inf. Fusion, 10 (4): 342-353 (2009)Replication Schemes in Unattended Wireless Sensor Networks., , и . NTMS, стр. 1-5. IEEE, (2011)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , и . CoRR, (2020)Reliable detection of compressed and encrypted data., , , , и . Neural Comput. Appl., 34 (22): 20379-20393 (2022)