From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network., , , , , , и . CNCERT, том 1299 из Communications in Computer and Information Science, стр. 3-15. Springer, (2020)MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning., , , , , и . ISSRE Workshops, стр. 359-364. IEEE, (2021)APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns., , , , , и . SP, стр. 4034-4052. IEEE, (2024)PACS: Pemission abuse checking system for android applictions based on review mining., , и . DSC, стр. 251-258. IEEE, (2017)Information Leakage by Model Weights on Federated Learning., , , , , , , и . PPMLP@CCS, стр. 31-36. ACM, (2020)Automatic Program Repair via Learning Edits on Sequence Code Property Graph., , , , и . ICPADS, стр. 563-570. IEEE, (2023)MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications., , , , , и . AIMS, том 10970 из Lecture Notes in Computer Science, стр. 123-140. Springer, (2018)RefGaussian: Disentangling Reflections from 3D Gaussian Splatting for Realistic Rendering., , , , , , , и . CoRR, (2024)Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art., , , , , , , , , и 1 other автор(ы). CoRR, (2021)A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild., , , , , , , и . CoRR, (2024)