From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust Training Using Natural Transformation., , , , , и . CoRR, (2021)CeMoSS - Certification and Model-Driven Development of Safe and Secure Software., , и . Software Engineering, том P-227 из LNI, стр. 207-208. GI, (2014)Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012)., , и . Software Engineering, том P-198 из LNI, стр. 198-200. GI, (2012)Authentication and Access Control in 5G Device-to-Device Communication., , и . TrustCom, стр. 1575-1582. IEEE, (2021)Cybersecurity Maturity in the Pacific Islands - Informing a Regional CERT Framework., , и . HICSS, стр. 1-10. ScholarSpace, (2022)R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy., , , , и . IJCNN, стр. 1-9. IEEE, (2022)Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia., , , , и . iConference (3), том 14598 из Lecture Notes in Computer Science, стр. 295-310. Springer, (2024)Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing., , , , , , , и . CoRR, (2024)Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems., , и . ISGT Asia, стр. 1-5. IEEE, (2021)Latent Space-Based Backdoor Attacks Against Deep Neural Networks., , и . IJCNN, стр. 1-10. IEEE, (2022)