From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting and characterizing social spam campaigns., , , , , и . ACM Conference on Computer and Communications Security, стр. 681-683. ACM, (2010)Towards a Timely Causality Analysis for Enterprise Security., , , , , , , и . NDSS, The Internet Society, (2018)TINET: Learning Invariant Networks via Knowledge Transfer., , , , , , и . KDD, стр. 1890-1899. ACM, (2018)Collaborative Alert Ranking for Anomaly Detection., , , , , , и . CIKM, стр. 1987-1995. ACM, (2018)BeeZip: Towards An Organized and Scalable Architecture for Data Compression., , , и . ASPLOS (3), стр. 133-148. ACM, (2024)NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis., , , , , , , , , и . CCS, стр. 1324-1337. ACM, (2018)Prototype Comparison Convolutional Networks for One-Shot Segmentation., , , , , и . IEEE Access, (2024)Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , и . INFOCOM, стр. 1091-1099. IEEE, (2010)High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 504-516. ACM, (2016)Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , и . AsiaCCS, стр. 8-9. ACM, (2012)