From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Out of control: stealthy attacks against robotic vehicles protected by control-based techniques., , и . ACSAC, стр. 660-672. ACM, (2019)Ranger: Boosting Error Resilience of Deep Neural Networks through Range Restriction., , и . CoRR, (2020)Discovering Application-Level Insider Attacks Using Symbolic Execution., , , и . SEC, том 297 из IFIP Advances in Information and Communication Technology, стр. 63-75. Springer, (2009)Error Resilient Machine Learning for Safety-Critical Systems: Position Paper., , и . IOLTS, стр. 1-4. IEEE, (2020)Design-Level and Code-Level Security Analysis of IoT Devices., и . ACM Trans. Embed. Comput. Syst., 18 (3): 20:1-20:25 (2019)Configurable Detection of SDC-causing Errors in Programs., , , , и . ACM Trans. Embed. Comput. Syst., 16 (3): 88:1-88:25 (2017)LetGo: A Lightweight Continuous Framework for HPC Applications Under Failures., , , , и . HPDC, стр. 117-130. ACM, (2017)SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework., , , и . IEEE Trans. Computers, 62 (11): 2292-2307 (2013)Automatic fault localization for client-side JavaScript., , , и . Softw. Test. Verification Reliab., 26 (1): 69-88 (2016)The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications., , , и . DSN, стр. 163-171. IEEE, (2022)