From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces., , , и . NSPW, стр. 90-103. ACM, (2022)Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network.. ACSAC, стр. 271-281. IEEE Computer Society, (2002)Trust of medical devices, applications, and users in pervasive healthcare., и . PETRA, стр. 54. ACM, (2011)SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability., , , , , , и . ARES, стр. 35:1-35:12. ACM, (2023)Alternative Route-Based Attacks in Metropolitan Traffic Systems., , , , и . DSN Workshops, стр. 20-27. IEEE, (2022)A 2×20W 0.0013% THD+N Class-D audio amplifier with consistent performance up to maximum power level., , , , , , , , , и 1 other автор(ы). ISSCC, стр. 56-58. IEEE, (2018)PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis., , , , , и . CoRR, (2024)Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem., , , и . ACSAC, стр. 428-429. IEEE Computer Society, (2003)Local perception and BSM based misbehavior detection in Intelligent Transportation System., , , , , и . VTC Fall, стр. 1-5. IEEE, (2022)The Solar Trust Model: Authentication Without Limitation., , и . ACSAC, стр. 300-307. IEEE Computer Society, (1998)