From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auction., , , и . Comput. Networks, (апреля 2023)Editorial., и . EAI Endorsed Trans. Security Safety, 6 (22): e1 (2020)Enriching Vulnerability Reports Through Automated and Augmented Description Summarization., и . CoRR, (2022)Self-Configurable Stabilized Real-Time Detection Learning for Autonomous Driving Applications., , , и . CoRR, (2022)SIA: Smartwatch-Enabled Inference Attacks on Physical Keyboards Using Acoustic Signals., , и . WPES@CCS, стр. 209-221. ACM, (2021)Do Content Management Systems Impact the Security of Free Content Websites?, , , , , и . CSoNet, том 13831 из Lecture Notes in Computer Science, стр. 141-154. Springer, (2022)The Infrastructure Utilization of Free Contents Websites Reveal Their Security Characteristics., и . CSoNet, том 14479 из Lecture Notes in Computer Science, стр. 255-267. Springer, (2023)Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description., , , и . CCS, стр. 3537-3539. ACM, (2023)Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and ChainQuality., , , и . CCS, стр. 988-1005. ACM, (2021)Measuring the Privacy Dimension of Free Content Websites through Automated Privacy Policy Analysis and Annotation., и . WWW (Companion Volume), стр. 860-867. ACM, (2022)