From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective., , и . CoRR, (2019)An Automated Multi-Tab Website Fingerprinting Attack., , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (6): 3656-3670 (2022)Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System., , , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Transmission delay in large scale ad hoc cognitive radio networks., , , и . MobiHoc, стр. 185-194. ACM, (2012)K-connectivity of cognitive radio networks., , , и . ICC, стр. 83-87. IEEE, (2012)Efficient Clustering on Encrypted Data., , , , , и . ACNS (1), том 14583 из Lecture Notes in Computer Science, стр. 213-236. Springer, (2024)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , и 1 other автор(ы). CCS, стр. 2421-2436. ACM, (2019)SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection., , , , и . MASS, стр. 308-316. IEEE Computer Society, (2018)Cross Container Attacks: The Bewildered eBPF on Clouds., , , , , , , и . USENIX Security Symposium, стр. 5971-5988. USENIX Association, (2023)Unsupervised Contextual Anomaly Detection for Database Systems., , , , , и . SIGMOD Conference, стр. 788-802. ACM, (2022)