From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Parametrized Hierarchical Procedures for Neural Programming., , , , , и . ICLR (Poster), OpenReview.net, (2018)Execution-Guided Neural Program Synthesis., , и . ICLR (Poster), OpenReview.net, (2019)Sanctorum: A lightweight security monitor for secure enclaves., , , , , , , и . DATE, стр. 1142-1147. IEEE, (2019)NetworkProfiler: Towards automatic fingerprinting of Android apps., , , , и . INFOCOM, стр. 809-817. IEEE, (2013)Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension., , , , , и . ICLR, OpenReview.net, (2020)Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , и . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)Differentiable Neural Network Architecture Search., , и . ICLR (Workshop), OpenReview.net, (2018)Delving into adversarial attacks on deep policies., и . ICLR (Workshop), OpenReview.net, (2017)Robust Physical-World Attacks on Deep Learning Models, , , , , , , , и . (2017)cite arxiv:1707.08945Comment: Accepted to CVPR 2018.Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 161-181. Springer, (2009)