From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Parametrized Hierarchical Procedures for Neural Programming., , , , , и . ICLR (Poster), OpenReview.net, (2018)Execution-Guided Neural Program Synthesis., , и . ICLR (Poster), OpenReview.net, (2019)Understanding Mobile App Usage Patterns Using In-App Advertisements., , , и . PAM, том 7799 из Lecture Notes in Computer Science, стр. 63-72. Springer, (2013)Privacy-Preserving Stream Aggregation with Fault Tolerance., , и . Financial Cryptography, том 7397 из Lecture Notes in Computer Science, стр. 200-214. Springer, (2012)A Learning-Based Approach to Reactive Security., , , , , и . Financial Cryptography, том 6052 из Lecture Notes in Computer Science, стр. 192-206. Springer, (2010)Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration., , , и . RAID, том 5758 из Lecture Notes in Computer Science, стр. 161-181. Springer, (2009)Sanctorum: A lightweight security monitor for secure enclaves., , , , , , , и . DATE, стр. 1142-1147. IEEE, (2019)NetworkProfiler: Towards automatic fingerprinting of Android apps., , , , и . INFOCOM, стр. 809-817. IEEE, (2013)Neural Symbolic Reader: Scalable Integration of Distributed and Symbolic Representations for Reading Comprehension., , , , , и . ICLR, OpenReview.net, (2020)The Honey Badger of BFT Protocols., , , , и . ACM Conference on Computer and Communications Security, стр. 31-42. ACM, (2016)