From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

All You Need is "Love": Evading Hate-speech Detection., , , , и . CoRR, (2018)Secure software installation in a mobile environment., и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 155-156. ACM, (2007)Extraction of Complex DNN Models: Real Threat or Boogeyman?, , , , и . CoRR, (2019)LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling., , и . TRUST, том 9229 из Lecture Notes in Computer Science, стр. 143-162. Springer, (2015)Authentication and key generation for mobile IP using GSM authentication and roaming., , и . ICC, стр. 2453-2457. IEEE, (2001)Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication., , , , и . CoRR, (2015)Protecting Web Passwords from Rogue Servers using Trusted Execution Environments., , , , и . CoRR, (2017)Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches., , , , , , , и . ACM Trans. Priv. Secur., 24 (4): 26:1-26:36 (2021)Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code?, , и . Empir. Softw. Eng., 28 (6): 129 (ноября 2023)Effective writing style imitation via combinatorial paraphrasing., и . CoRR, (2019)