From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An immersive multi-agent system for interactive applications., , , и . Vis. Comput., 29 (5): 323-332 (2013)An analytical framework for reliability evaluation of d-dimensional IEEE 802.11 broadcast wireless networks., , , , , и . Wirel. Networks, 26 (5): 3373-3394 (2020)Input-free cascode Vthn and Vthp extractor circuits., , и . ICECS, стр. 282-285. IEEE, (2004)CMM: A Combination-Based Mutation Method for SQL Injection., , , и . SOFL+MSVL, том 12028 из Lecture Notes in Computer Science, стр. 345-361. Springer, (2019)MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing., , , , , , , , , и . ICDE, стр. 1972-1985. IEEE, (2024)snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning., , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Software Maintenance Optimization Based on Stackelberg Game Methods., , , , , , и . ISSRE Workshops, стр. 426-430. IEEE Computer Society, (2014)Struggle with Adversarial Defense? Try Diffusion., , , , , , и . CoRR, (2024)PyraTrans: Attention-Enriched Pyramid Transformer for Malicious URL Detection., , , , , , и . CoRR, (2023)A Large-Scale Pretrained Deep Model for Phishing URL Detection., , , , , и . ICASSP, стр. 1-5. IEEE, (2023)