From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT., , , , , и . IEEE Trans. Sustain. Comput., 8 (1): 32-42 (января 2023)Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN., , , , , , и . DSN, стр. 63-74. IEEE, (2021)Efficient Hash-Based Redactable Signature for Smart Grid Applications., , , , , и . ESORICS (3), том 13556 из Lecture Notes in Computer Science, стр. 554-573. Springer, (2022)An Investigation into Misuse of Java Security APIs by Large Language Models., , , , и . CoRR, (2024)Quantization Backdoors to Deep Learning Commercial Frameworks., , , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1155-1172 (мая 2024)OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning., , , , , и . IEEE Trans. Parallel Distributed Syst., 33 (12): 3460-3477 (2022)Profiler: Profile-Based Model to Detect Phishing Emails., , , , , и . CoRR, (2022)RAIDER: Reinforcement-aided Spear Phishing Detector., , , , , и . CoRR, (2021)Why Do Facial Deepfake Detectors Fail?, , , , и . WDC@AsiaCCS, стр. 24-28. ACM, (2023)Towards Understanding of Deepfake Videos in the Wild., , , , , , и . CIKM, стр. 4530-4537. ACM, (2023)