From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things., , и . ICIOT, стр. 49-56. IEEE Computer Society, (2018)Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs., и . DSC, стр. 181-187. IEEE, (2017)Context-Aware Autonomous Security Assertion for Industrial IoT., , , и . IEEE Access, (2020)Automatic identification of sarcasm in tweets and customer reviews., , , , , , и . J. Intell. Fuzzy Syst., 37 (5): 6815-6828 (2019)Analysis of Eyebrow Motion for Micro-Expression Recognition., , и . ICIGP, стр. 109-116. ACM, (2022)Big Data Dimensionality Reduction for Wireless Sensor Networks Using Stacked Autoencoders., , , , , и . RIIFORUM, стр. 391-400. Springer, (2019)Examination of Double Arbiter PUFs on Security against Machine Learning Attacks., , , и . IEEE BigData, стр. 3165-3171. IEEE, (2019)Emerging Computer Vision Based Machine Learning Issues for Smart Cities., , , , и . RIIFORUM, стр. 315-322. Springer, (2019)LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs., , , и . IEEE BigData, стр. 2063-2070. IEEE, (2018)Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices., , , и . PST, стр. 1-9. IEEE, (2019)