From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Taking a HINT: Leveraging Explanations to Make Vision and Language Models More Grounded., , , , , и . CoRR, (2019)Learning Out-of-Vocabulary Words in Intelligent Personal Agents., , и . IJCAI, стр. 4309-4315. ijcai.org, (2018)Bayesian Methods for Practical Traitor Tracing., и . ACNS, том 4521 из Lecture Notes in Computer Science, стр. 194-206. Springer, (2007)Software Tamper Resistance Using Program Certificates., , и . SAFECOMP, том 2788 из Lecture Notes in Computer Science, стр. 144-158. Springer, (2003)Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging., , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 268-284. Springer, (2009)Mobile App Security Risk Assessment: A Crowdsourcing Ranking Approach from User Comments., , , и . SDM, стр. 658-666. SIAM, (2015)Differentially Private $k$-Means Clustering., , , , и . CoRR, (2015)Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks., и . CIKM, стр. 381-390. ACM, (2014)Traitor tracing for prerecorded and recordable media., , и . Digital Rights Management Workshop, стр. 83-90. ACM, (2004)Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , и . MobiSys, стр. 89-103. ACM, (2015)