From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Users' Rating Behaviour to Enhance the Robustness of Social Recommendation., , , , , и . WISE (2), том 10570 из Lecture Notes in Computer Science, стр. 467-475. Springer, (2017)A Verifiable Ranked Choice Internet Voting System., , , , , , и . WISE (2), том 10570 из Lecture Notes in Computer Science, стр. 490-501. Springer, (2017)DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping., , , и . DAC, стр. 1-6. IEEE, (2020)Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , и . CoRR, (2018)GhostKnight: Breaching Data Integrity via Speculative Execution., , , и . CoRR, (2020)Towards Risk-Aware Cost-Optimal Resource Allocation for Cloud Applications., , , , и . SCC, стр. 210-214. IEEE, (2019)Scheduling Real-Time Security Aware Tasks in Fog Networks., , , , и . IEEE Trans. Serv. Comput., 14 (6): 1981-1994 (2021)Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm., , , и . IEEE Access, (2021)DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream., , , и . ACM Trans. Embed. Comput. Syst., 16 (2): 51:1-51:24 (2017)Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection., , , , , , и . CoRR, (2023)