From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Certified Defences to Attack Randomised Smoothing., , , , и . CoRR, (2023)Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness., , , , , , , , и . AAAI, стр. 14783-14791. AAAI Press, (2023)An efficient semi-supervised SVM for anomaly detection., и . IJCNN, стр. 2843-2850. IEEE, (2017)Information-theoretic Source Code Vulnerability Highlighting., , , , , и . IJCNN, стр. 1-8. IEEE, (2021)Deep Domain Adaptation for Vulnerable Code Function Identification., , , , , , , и . IJCNN, стр. 1-8. IEEE, (2019)Translation of Rights Expressions., и . ACSW, том 44 из CRPIT, стр. 137-144. Australian Computer Society, (2005)An elliptic curve authenticated key exchange based approach to key infrastructure., , , и . KES, стр. 513-517. IEEE, (1999)Elliptic Curve Based Password Authenticated Key Exchange Protocols., , и . ACISP, том 2119 из Lecture Notes in Computer Science, стр. 487-501. Springer, (2001)Adversarial Robustness on Image Classification With k-Means., , и . IEEE Access, (2024)Code Pointer Network for Binary Function Scope Identification., , , , , , и . IJCNN, стр. 1-7. IEEE, (2020)