From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Random access success probability in full-duplex radio networks., , и . ICUFN, стр. 99-101. IEEE, (2016)CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture., , , , , и . IEEE Access, (2024)Model Stealing Defense against Exploiting Information Leak through the Interpretation of Deep Neural Nets., , и . IJCAI, стр. 710-716. ijcai.org, (2022)Similarity-Based Source Code Vulnerability Detection Leveraging Transformer Architecture: Harnessing Cross- Attention for Hierarchical Analysis., , , , , и . IEEE Access, (2024)Analysis of D2D system performance with a maximal SINR channel selection strategy., , и . ICTC, стр. 379-380. IEEE, (2014)A 110dB-CMRR 100dB-PSRR multi-channel neural-recording amplifier system using differentially regulated rejection ratio enhancement in 0.18μm CMOS., , , , , , , и . ISSCC, стр. 472-474. IEEE, (2018)A Secure Transmission Scheme at The Receiver for Eavesdropping Prevention., , и . VTC Spring, стр. 1-5. IEEE, (2020)Classification of Stroke Severity Using Clinically Relevant Symmetric Gait Features Based on Recursive Feature Elimination With Cross-Validation., , , , , , и . IEEE Access, (2022)A neural recording amplifier based on adaptive SNR optimization technique for long-term implantation., , , , , , , , и . BioCAS, стр. 1-4. IEEE, (2017)SwiftThief: Enhancing Query Efficiency of Model Stealing by Contrastive Learning., , и . IJCAI, стр. 422-430. ijcai.org, (2024)