From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Message Passing Algorithm for GFDM-IM Detection., и . DSP, стр. 1-5. IEEE, (2018)A Quantitative Study of Forum Spamming Using Context-based Analysis., , , , и . NDSS, The Internet Society, (2007)Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships., , , и . ICIS, стр. 74. Association for Information Systems, (2009)Five Years of the Right to be Forgotten., , , , , , , , , и 10 other автор(ы). ACM Conference on Computer and Communications Security, стр. 959-972. ACM, (2019)iPhish: Phishing Vulnerabilities on Consumer Electronics., , и . UPSEC, USENIX Association, (2008)Research on PCB Defect Detection Algorithm Based on Improved YOLOv5., , и . RICAI, стр. 1220-1224. ACM, (2022)Spam double-funnel: connecting web spammers with advertisers., , , и . WWW, стр. 291-300. ACM, (2007)Implicit Authentication through Learning User Behavior., , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 99-113. Springer, (2010)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , и . WWW, стр. 1009-1019. ACM, (2016)Gesture Authentication with Touch Input for Mobile Devices., и . MobiSec, том 94 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 13-24. Springer, (2011)