From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SAGE: Intrusion Alert-driven Attack Graph Extractor., , и . VizSec, стр. 36-41. IEEE, (2021)Black-box mixed-variable optimisation using a surrogate model that satisfies integer constraints., , , и . GECCO Companion, стр. 1851-1859. ACM, (2021)Continuous Surrogate-Based Optimization Algorithms Are Well-Suited for Expensive Discrete Problems., , , и . BNAIC/BENELEARN (Selected Papers), том 1398 из Communications in Computer and Information Science, стр. 48-63. Springer, (2020)Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning., , , , и . CoRR, (2023)Learning state machines via efficient hashing of future traces., и . CoRR, (2022)Hybrid Connection and Host Clustering for Community Detection in Spatial-Temporal Network Data., , и . PKDD/ECML Workshops, том 1323 из Communications in Computer and Information Science, стр. 178-204. Springer, (2020)Vulnerability Detection on Mobile Applications Using State Machine Inference., и . EuroS&P Workshops, стр. 1-10. IEEE, (2018)Efficient Training of Robust Decision Trees Against Adversarial Examples., и . CoRR, (2020)MalPaCA: Malware Packet Sequence Clustering and Analysis., , , и . CoRR, (2019)Encoding NetFlows for State-Machine Learning., , , , и . CoRR, (2022)