From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adaptive feature selection via a new version of support vector machine., , , , и . Neural Comput. Appl., 23 (3-4): 937-945 (2013)SecTap: Secure Back of Device Input System for Mobile Devices., , , , , и . INFOCOM, стр. 1520-1528. IEEE, (2018)Your clicks reveal your secrets: a novel user-device linking method through network and visual data., , , , , и . Multim. Tools Appl., 78 (7): 8337-8362 (2019)Blind detection of spread spectrum flow watermarks., , , , , и . Secur. Commun. Networks, 6 (3): 257-274 (2013)802.11ac Device Identification based on MAC Frame Analysis., , , , , и . CSCWD, стр. 366-371. IEEE, (2021)Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery., , , , , и . INFOCOM, стр. 1709-1718. IEEE, (2022)Implication of Animation on Android Security., , , , , , , и . ICDCS, стр. 1122-1132. IEEE, (2022)Cyber Crime Scene Investigations (C²SI) through Cloud Computing., , , и . ICDCS Workshops, стр. 26-31. IEEE Computer Society, (2010)A new cell counter based attack against tor., , , , , и . CCS, стр. 578-589. ACM, (2009)Fingerprint attack against touch-enabled devices., , , , , и . SPSM@CCS, стр. 57-68. ACM, (2012)