From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW (Companion Volume), стр. 1288-1289. ACM, (2019)BootStomp: On the Security of Bootloaders in Mobile Devices., , , , , , , , и . USENIX Security Symposium, стр. 781-798. USENIX Association, (2017)Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization., , , , и . ICWS, стр. 862-865. IEEE, (2017)Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing., , , , , , , , и . USENIX Security Symposium, стр. 1239-1256. USENIX Association, (2022)Toward the Analysis of Embedded Firmware through Automated Re-hosting., , , , , , , , , и 1 other автор(ы). RAID, стр. 135-150. USENIX Association, (2019)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW, стр. 3108-3115. ACM, (2019)Using Loops For Malware Classification Resilient to Feature-unaware Perturbations., , , , , , и . ACSAC, стр. 112-123. ACM, (2018)Immunoinformatic discovery of potential cross-reactive T cell epitopes in the measles genome., , , , , и . BCB, стр. 589-593. ACM, (2011)BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments., , , , , , , , , и . NDSS, The Internet Society, (2017)Command and Control Collaboration Sand Table (C2-CST)., , , , , , и . HCI (10), том 10910 из Lecture Notes in Computer Science, стр. 249-259. Springer, (2018)