From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A metric of identification performance of biometrics based on information content., , , и . ICARCV, стр. 1274-1279. IEEE, (2010)Identifying Adversarial Sentences by Analyzing Text Complexity., , , и . CoRR, (2019)On Embedding Backdoor in Malware Detectors Using Machine Learning., , , , , и . PST, стр. 1-5. IEEE, (2019)Active Attack Against Oblivious RAM., , , и . AINA, стр. 744-751. IEEE Computer Society, (2018)Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme., , и . BIOSIG, том P-196 из LNI, стр. 1-6. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.Stronger Targeted Poisoning Attacks Against Malware Detection., , , , , , и . CANS, том 12579 из Lecture Notes in Computer Science, стр. 65-84. Springer, (2020)On Partitioning Secret Data Based on Concept of Functional Safety., и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 110-121. Springer, (2015)AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning., , и . CODASPY, стр. 325-336. ACM, (2024)Membership Inference Attacks against GNN-based Hardware Trojan Detection., , , , , и . TrustCom, стр. 1222-1229. IEEE, (2023)Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users., , , и . ICISSP, стр. 370-377. SciTePress, (2019)