From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Application of CAM Memories in Real-time Systems., и . PDPTA, стр. 1897-1903. CSREA Press, (2002)SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning., , , и . PST, стр. 1-8. IEEE, (2021)Proactive Detection of Query-based Adversarial Scenarios in NLP Systems., , , , и . AISec@CCS, стр. 103-113. ACM, (2022)The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective., , и . CoRR, (2022)The Modular Subset-Sum Problem and the size of deletion correcting codes., и . Des. Codes Cryptogr., 90 (8): 1721-1734 (2022)Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning., , , и . ACM Comput. Surv., 55 (12): 262:1-262:34 (декабря 2023)Root causing, detecting, and fixing flaky tests: State of the art and future roadmap., , , и . Softw. Pract. Exp., 51 (5): 851-867 (2021)An Approach to Exploiting Skewed Associative Memories in Avionics Systems., и . ICPADS, стр. 517-522. IEEE Computer Society, (2002)Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach, и . Springer, (2022)Secure UAV (Drone) and the Great Promise of AI., , , , и . ACM Comput. Surv., 56 (11): 286:1-286:37 (ноября 2024)