From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Beyond Homology Transfer: Deep Learning for Automated Annotation of Proteins., , , и . J. Grid Comput., 17 (2): 225-237 (2019)Using trusted computing for privacy preserving keystroke-based authentication in smartphones., , и . Telecommun. Syst., 52 (4): 2149-2161 (2013)Deep neural architectures for large scale android malware analysis., , , и . Clust. Comput., 21 (1): 569-588 (2018)Trust in IoT: dynamic remote attestation through efficient behavior capture., , и . Clust. Comput., 21 (1): 409-421 (2018)Gene Ontology Capsule GAN: an improved architecture for protein function prediction., , , и . PeerJ Comput. Sci., (2022)A three-way decision making approach to malware analysis using probabilistic rough sets., , и . Inf. Sci., (2016)On Leveraging Stochastic Models for Remote Attestation., , и . INTRUST, том 6802 из Lecture Notes in Computer Science, стр. 290-301. Springer, (2010)Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform., , , и . TRUST, том 6101 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2010)TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones., и . ISA, том 76 из Communications in Computer and Information Science, стр. 286-297. Springer, (2010)DeepMoney: counterfeit money detection using generative adversarial networks., , , , , и . PeerJ Comput. Sci., (2019)