From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unsupervised Learning for security of Enterprise networks by micro-segmentation., , и . CoRR, (2020)Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking., , , и . Proc. Priv. Enhancing Technol., 2018 (2): 122-142 (2018)On the Privacy of the Opal Data Release: A Response., , и . CoRR, (2017)Watching videos from everywhere: a study of the PPTV mobile VoD system., , , , , , и . Internet Measurement Conference, стр. 185-198. ACM, (2012)Private Processing of Outsourced Network Functions: Feasibility and Constructions., , , и . IACR Cryptology ePrint Archive, (2015)A deep dive into location-based communities in social discovery networks., , , , и . Comput. Commun., (2017)Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users., , , , , и . CoRR, (2024)The Value of Collaboration in Convex Machine Learning with Differential Privacy., , , и . CoRR, (2019)5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System., , , и . CoRR, (2022)A deep dive into the consistently toxic 1% of Twitter., , , , , и . CoRR, (2022)