From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning., , , , , , , , и . NDSS, The Internet Society, (2023)Profiler: Distributed Model to Detect Phishing., , , , , и . ICDCS, стр. 1336-1337. IEEE, (2022)Text and Data Mining Techniques in Adverse Drug Reaction Detection., , , , и . ACM Comput. Surv., 47 (4): 56:1-56:39 (2015)Demo - MaLFraDA: A Machine Learning Framework with Data Airlock., , , , и . CCS, стр. 3523-3525. ACM, (2022)Collaborative analysis of genomic data: vision and challenges., , , , и . CoRR, (2022)Machine Learning for Detecting Data Exfiltration., , , и . CoRR, (2020)Internet of Things (IoT) and Cloud Computing Enabled Disaster Management., , , , , , , , , и 1 other автор(ы). CoRR, (2018)Crowdsensing and privacy in smart city applications., , , , , , и . CoRR, (2018)Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns., , , , , , , , и . CoRR, (2022)Secrecy capacity against adaptive eavesdroppers in a random wireless network using friendly jammers and protected zone., , , , и . J. Netw. Comput. Appl., (2020)