From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , и . CoRR, (2018)Intersection Traffic Prediction Using Decision Tree Models., , , и . Symmetry, 10 (9): 386 (2018)Event detection in online social network: Methodologies, state-of-art, and evolution., , , , , , и . Comput. Sci. Rev., (2022)How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse., , , , , , и . Connect. Sci., (2024)The "code" of Ethics: A Holistic Audit of AI Code Generators., , , , и . CoRR, (2023)Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples., , , , и . CoRR, (2019)Characterizing Sensor Leaks in Android Apps., , , , , и . CoRR, (2022)Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks., , , , , , , и . J. Comput. Sci., (2018)Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey., , , , , и . IEEE CAA J. Autom. Sinica, 9 (3): 377-391 (2022)The Microcosmic Model of Worm Propagation., , , , и . Comput. J., 54 (10): 1700-1720 (2011)