From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Language Models (Mostly) Know What They Know, , , , , , , , , и 26 other автор(ы). (2022)cite arxiv:2207.05221Comment: 23+17 pages; refs added, typos fixed.Windows Surface RT tablet forensics., , , и . Digit. Investig., 11 (Supplement 1): S87-S93 (2014)Overview of SIP Attacks and Countermeasures., , и . ISDF, том 41 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 82-91. Springer, (2009)Language Models (Mostly) Know What They Know., , , , , , , , , и 26 other автор(ы). CoRR, (2022)Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market., , и . J. Digit. Forensics Secur. Law, 3 (2): 55-70 (2008)The impact of abrupt suspension of solar radiation management (termination effect) in experiment G2 of the Geoengineering Model Intercomparison Project (GeoMIP): THE TERMINATION EFFECT IN GEOMIP G2, , , , , , , , , и 8 other автор(ы). Journal of Geophysical Research: Atmospheres, 118 (17): 9743--9752 (сентября 2013)Information warfare - what is it?. Inf. Secur. Tech. Rep., 4 (3): 12-19 (1999)Catching the malicious insider.. Inf. Secur. Tech. Rep., 13 (4): 220-224 (2008)Applying the ACPO Guidelines to Building Automation Systems., , , , , и . HCI (22), том 9190 из Lecture Notes in Computer Science, стр. 684-692. Springer, (2015)Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned., , , , , , , , , и 26 other автор(ы). CoRR, (2022)