From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack., , , , , и . IEEE/ACM Trans. Netw., 27 (5): 1815-1829 (2019)TextBugger: Generating Adversarial Text Against Real-world Applications., , , , и . CoRR, (2018)VeriFi: Towards Verifiable Federated Unlearning., , , , , , , и . CoRR, (2022)Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction., , , , , , и . IEEE Trans. Pattern Anal. Mach. Intell., 45 (1): 681-697 (2023)AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection., , , , и . CoRR, (2023)All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning., , , , и . CoRR, (2022)Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems., , , и . IEEE Trans. Inf. Forensics Secur., 14 (5): 1337-1350 (2019)A Practical Black-Box Attack on Source Code Authorship Identification Classifiers., , , и . IEEE Trans. Inf. Forensics Secur., (2021)Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning., , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 3653-3668 (сентября 2023)Remote Attacks on Drones Vision Sensors: An Empirical Study., , , и . IEEE Trans. Dependable Secur. Comput., 19 (5): 3125-3135 (2022)