From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Attacks on Skeleton-Based Sign Language Recognition., , , , и . ICIRA (1), том 14267 из Lecture Notes in Computer Science, стр. 33-43. Springer, (2023)A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices., , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (3): 1826-1840 (2022)Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval., , , , , и . Neurocomputing, (2021)iQuery: A Trustworthy and Scalable Blockchain Analytics Platform., , , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (6): 4578-4592 (ноября 2023)A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware., , , , , , , , , и 1 other автор(ы). ISSTA, стр. 442-454. ACM, (2022)Figure it Out: Analyzing-based Jailbreak Attack on Large Language Models., , , , , и . CoRR, (2024)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , и 1 other автор(ы). CoRR, (2022)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , и 1 other автор(ы). IEEE Trans. Dependable Secur. Comput., 21 (3): 1372-1389 (мая 2024)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 4205-4222. USENIX Association, (2021)