From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rare Category Detection Forest., , , и . KSEM, том 9403 из Lecture Notes in Computer Science, стр. 612-618. Springer, (2015)Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs., , , , , , и . AISec@CCS, стр. 85-96. ACM, (2018)A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices., , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (3): 1826-1840 (2022)Course-Correction: Safety Alignment Using Synthetic Preferences., , , , , , , , и . CoRR, (2024)RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer., , , , , , , и . CoRR, (2024)Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models., , , , , , и . SP, стр. 2553-2571. IEEE, (2024)Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration., , , , , и . CCS, стр. 1153-1167. ACM, (2023)VILLAIN: Backdoor Attacks Against Vertical Split Learning., , , , , и . USENIX Security Symposium, стр. 2743-2760. USENIX Association, (2023)Exploring ChatGPT's Capabilities on Vulnerability Management., , , , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)DeT: Defending Against Adversarial Examples via Decreasing Transferability., , , , и . CSS (1), том 11982 из Lecture Notes in Computer Science, стр. 307-322. Springer, (2019)