From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The role of mobile forensics in terrorism investigations involving the use of cloud apps., , , , и . MobiMedia, стр. 199-204. ACM, (2016)Group-driven Reinforcement Learning for Personalized mHealth Intervention., , , , и . CoRR, (2017)Universal Adversarial Training., , , , , и . CoRR, (2018)Resilient Reorder Buffer Design for Network-on-Chip., и . ISQED, стр. 92-97. IEEE, (2019)Universal Adversarial Training., , , , , и . AAAI, стр. 5636-5643. AAAI Press, (2020)TxChain: Scaling Sharded Decentralized Ledger via Chained Transaction Sequences., , , , и . DASFAA (1), том 13245 из Lecture Notes in Computer Science, стр. 333-340. Springer, (2022)URIM: Utility-Oriented Role-Centric Incentive Mechanism Design for Blockchain-Based Crowdsensing., , , , и . DASFAA (3), том 12683 из Lecture Notes in Computer Science, стр. 358-374. Springer, (2021)Learning to Generate Image Embeddings with User-Level Differential Privacy., , , , , , , , и . CVPR, стр. 7969-7980. IEEE, (2023)Adversarial training for free!, , , , , , , , и . NeurIPS, стр. 3353-3364. (2019)A 3D Visualization Method for Bladder Filling Examination Based on EIT., , , , и . Comput. Math. Methods Medicine, (2012)