From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks., , , , , , , , , и 2 other автор(ы). SEC, стр. 378-380. IEEE, (2018)ACComplice: Location inference using accelerometers on smartphones., , , , и . COMSNETS, стр. 1-9. IEEE, (2012)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , и . ACM Conference on Computer and Communications Security, стр. 13-24. ACM, (2013)QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks., , , , , и . Financial Cryptography Workshops, том 7862 из Lecture Notes in Computer Science, стр. 52-69. Springer, (2013)ACCessory: password inference using accelerometers on smartphones., , , , и . HotMobile, стр. 9. ACM, (2012)OTO: online trust oracle for user-centric trust establishment., , , , , , и . CCS, стр. 391-403. ACM, (2012)Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, , , , и . TRUST, том 7344 из Lecture Notes in Computer Science, стр. 159-178. Springer, (2012)A systematic framework for dynamic nodal vulnerability assessment of water distribution networks based on multilayer networks., , , и . Reliab. Eng. Syst. Saf., (2022)Claim Mobile: Engaging conflicting stakeholder requirements in healthcare in Uganda., , и . ICTD, стр. 35-45. IEEE, (2009)Causal Factors of Corruption in Construction Project Management: An Overview., , и . Sci. Eng. Ethics, 25 (1): 1-31 (2019)