From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Safety and Efficiency of Virtual Firewall Elasticity Control., , , , , , и . NDSS, The Internet Society, (2017)Understanding and Detecting Remote Infection on Linux-based IoT Devices., , , , , , и . AsiaCCS, стр. 873-887. ACM, (2022)An Investigation of Large Language Models for Real-World Hate Speech Detection., , , , , , и . ICMLA, стр. 1568-1573. IEEE, (2023)Efficient construction of provably secure steganography under ordinary covert channels., , , , и . Sci. China Inf. Sci., 55 (7): 1639-1649 (2012)Problematic Privacy Policies of Voice Assistant Applications., , , , и . IEEE Secur. Priv., 19 (6): 66-73 (2021)Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation., , , , и . IEEE Trans. Neural Networks Learn. Syst., 35 (2): 2425-2435 (февраля 2024)Defensive maneuver cyber platform modeling with Stochastic Petri Nets., , и . CollaborateCom, стр. 531-538. ICST / IEEE, (2014)When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs., , , , , , и . ICNP, стр. 1-6. IEEE, (2019)VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls., , , , , , , и . NFV-SDN, стр. 107-114. IEEE, (2015)Enabling verification and conformance testing for access control model., и . SACMAT, стр. 195-204. ACM, (2008)