From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures., , , , и . J. Comput. Syst. Sci., (2021)A time-synchronized ZigBee building network for smart water management., , , , , , и . INDIN, стр. 1219-1222. IEEE, (2017)Securing Smart Grid In-Network Aggregation through False Data Detection., и . EAI Endorsed Trans. Ind. Networks Intell. Syst., 4 (10): e5 (2017)Exploring the Security of Certificate Transparency in the Wild., , , и . ACNS Workshops, том 12418 из Lecture Notes in Computer Science, стр. 453-470. Springer, (2020)Understanding rating behavior based on moral foundations: The case of Yelp reviews., и . IEEE BigData, стр. 3938-3945. IEEE Computer Society, (2017)Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems., , , , и . ESORICS (3), том 13556 из Lecture Notes in Computer Science, стр. 343-363. Springer, (2022)$AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware., , , , , и . ICSE, стр. 1-12. ACM, (2022)A Content-Aware Trust Index for Online Review Spam Detection., и . DBSec, том 10359 из Lecture Notes in Computer Science, стр. 489-508. Springer, (2017)Automaton segmentation: a new approach to preserve privacy in xml information brokering., , , , и . CCS, стр. 508-518. ACM, (2007)Cyber-Physical Systems Security - A Survey., , , и . IEEE Internet Things J., 4 (6): 1802-1831 (2017)