From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control., , , , , , и . IEEE Trans. Syst. Man Cybern. Syst., 54 (2): 997-1010 (февраля 2024)PentestGPT: An LLM-empowered Automatic Penetration Testing Tool., , , , , , , , , и . CoRR, (2023)VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder., , , , , , , и . CoRR, (2022)The Threat of Offensive AI to Organizations., , , , , , , , , и . CoRR, (2021)LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study., , , , и . CoRR, (2024)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , и . EuroS&P, стр. 1082-1100. IEEE, (2023)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , и . ICSE, стр. 64:1-64:12. ACM, (2024)Morest: Model-based RESTful API Testing with Execution Feedback., , , , , , , , и . ICSE, стр. 1406-1417. ACM, (2022)ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics., , , , и . CoRR, (2023)SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View., , , , , , и . CoRR, (2022)