From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering., , , , и . CoRR, (2023)Automated Feature Engineering for AutoML Using Genetic Algorithms., и . SECRYPT, стр. 450-459. SCITEPRESS, (2023)Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning., , , и . ICBEA, стр. 50-57. ACM, (2018)Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History., , и . FPS, том 12056 из Lecture Notes in Computer Science, стр. 387-397. Springer, (2019)Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains., , , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 51-59. IEEE, (2021)Method ontology for intelligent network forensics analysis., и . PST, стр. 7-14. IEEE, (2010)Preserving Privacy Through Dememorization: An Unlearning Technique For Mitigating Memorization Risks In Language Models., , и . EMNLP, стр. 4360-4379. Association for Computational Linguistics, (2023)The Curious Case of Machine Learning in Malware Detection., , и . ICISSP, стр. 528-535. SciTePress, (2019)A semantic analysis approach to manage IDS alerts flooding., и . IAS, стр. 156-161. IEEE, (2011)Alpaca against Vicuna: Using LLMs to Uncover Memorization of LLMs., , , , , , , и . CoRR, (2024)