From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies., , , , , , и . WISEC, стр. 227-238. ACM, (2023)Towards Feasible Region Calculus: An End-to-End Schedulability Analysis of Real-Time Multistage Execution., и . RTSS, стр. 75-86. IEEE Computer Society, (2005)sc2MeNetDrug: A computational tool to uncover inter-cell signaling targets and identify relevant drugs based on single cell RNA-seq data., , , , , , , , , и 1 other автор(ы). PLoS Comput. Biol., (января 2024)Extending the Assistance Model: Analyzing the Use of Assistance over Time., , , и . EDM, стр. 59-66. International Educational Data Mining Society, (2013)Securing Binary Code., , , , и . IEEE Secur. Priv., 15 (6): 77-81 (2017)Learning Bayesian Knowledge Tracing Parameters with a Knowledge Heuristic and Empirical Probabilities., , и . Intelligent Tutoring Systems, том 8474 из Lecture Notes in Computer Science, стр. 150-155. Springer, (2014)Mixr: Flexible Runtime Rerandomization for Binaries., , , , и . MTD@CCS, стр. 27-37. ACM, (2017)Building Automated Detectors of Gameplay Strategies to Measure Implicit Science Learning., , , , и . EDM, стр. 337-338. International Educational Data Mining Society (IEDMS), (2014)Zipr: Efficient Static Binary Rewriting for Security., , , , и . DSN, стр. 559-566. IEEE Computer Society, (2017)SOPCs: Systems on Programmable Chips.. Handbook of Networked and Embedded Control Systems, Birkhäuser, (2005)