From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tree decomposition based anomalous connected subgraph scanning for detecting and forecasting events in attributed social media networks., , , , и . Neurocomputing, (2020)Decentralization Paradox: A Study of Hegemonic and Risky ERC-20 Tokens., и . CoRR, (2022)NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing., , , , , и . DSN, стр. 355-366. IEEE, (2022)Uplink MU-MIMO in Asynchronous Wireless LANs., , и . MobiHoc, стр. 21-30. ACM, (2018)MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems., , , , и . MobiCom, стр. 48:1-48:15. ACM, (2023)SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves., , , , и . NDSS, The Internet Society, (2020)SoundFence: Securing Ultrasonic Sensors in Vehicles Using Physical-Layer Defense., , , и . SECON, стр. 1-9. IEEE, (2021)Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots., , , , и . RAID, стр. 282-296. ACM, (2023)FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker., , , , и . INFOCOM, стр. 1-10. IEEE, (2023)Non-parametric passive traffic monitoring in cognitive radio networks., , , , , , и . INFOCOM, стр. 1240-1248. IEEE, (2013)