From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications., , , и . EAI Endorsed Trans. Security Safety, 7 (23): e5 (2020)Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , и . WiSec, стр. 290-291. ACM, (2019)Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments., , , , , и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 299-312. Springer, (2019)On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study., , , , и . ICTC, стр. 100-104. IEEE, (2020)Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks., , и . PST, стр. 1-10. IEEE Computer Society, (2018)Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems., , , , , и . ICDCS, стр. 1296-1305. IEEE, (2019)Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection., , , , , и . ICICS, том 12282 из Lecture Notes in Computer Science, стр. 443-461. Springer, (2020)Proactive detection of algorithmically generated malicious domains., , , и . ICOIN, стр. 21-24. IEEE, (2018)Investigating DNS Manipulation by Open DNS Resolvers., , и . CoNEXT Companion, стр. 45-46. ACM, (2019)Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699., , , , , и . Comput. Networks, (2021)