From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CERBERUS: Exploring Federated Prediction of Security Events., , , , , и . CCS, стр. 2337-2351. ACM, (2022)Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance., , , , , , , и . CCS, стр. 60-74. ACM, (2023)Identification of Emotional Valences via Memory-Informed Deep Neural Network with Entropy Features., , , , , и . ICMSSP, стр. 31-35. ACM, (2019)Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes., , , , и . NDSS, The Internet Society, (2021)Explainable artificial intelligence for cybersecurity: a literature survey., , , , , , , , и . Ann. des Télécommunications, 77 (11-12): 789-812 (2022)Hybrid Pre-training Based on Masked Autoencoders for Medical Image Segmentation., , , , , и . NCTCS, том 1693 из Communications in Computer and Information Science, стр. 175-182. Springer, (2022)Characterizing the Evasion Attackability of Multi-label Classifiers., , и . AAAI, стр. 10647-10655. AAAI Press, (2021)Robust Multi-Output Learning with Highly Incomplete Data via Restricted Boltzmann Machines., , , и . STAIRS@ECAI, том 2655 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)Embedded Palmprint Recognition System on Mobile Devices., , , и . ICB, том 4642 из Lecture Notes in Computer Science, стр. 1184-1193. Springer, (2007)Screening NLOS Anchor Nodes with Ellipsoid Constraint in 3D Positioning., , , и . EITCE, стр. 307-312. ACM, (2020)