From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey., , , и . IEEE Internet Things J., 8 (1): 65-84 (2021)ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation., , , , , , , , и . IEEE Internet Things J., 9 (4): 2485-2496 (2022)AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors., , , и . IEEE Internet Things J., 7 (6): 5008-5020 (2020)Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks., , , , и . CoRR, (2023)Black-box and Target-specific Attack Against Interpretable Deep Learning Systems., , , и . AsiaCCS, стр. 1216-1218. ACM, (2022)An Exploration of Geo-temporal Characteristics of Users' Reactions on Social Media During the Pandemic., , , и . CoRR, (2021)Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches., , , , , и . IEEE Access, (2022)Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware., , , и . AsiaCCS, стр. 1240-1242. ACM, (2022)Impact of Architectural Modifications on Deep Learning Adversarial Robustness., , , , и . CoRR, (2024)Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning., , , , и . CoRR, (2022)