From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Bitcoin Users Using Deep Neural Network., , , , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 178-192. Springer, (2018)Control Flow Obfuscation Using Neural Network to Fight Concolic Testing., , , , , и . SecureComm (1), том 152 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 287-304. Springer, (2014)MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks., , , , и . J. Internet Serv. Inf. Secur., 4 (1): 25-36 (2014)Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.. ACC, стр. 4455-4456. IEEE, (2002)A Secure Architecture for Data Storage in the Cloud Environments., , , и . IMIS, стр. 289-291. IEEE Computer Society, (2015)Password Guessing via Neural Language Modeling., , , , и . ML4CS, том 11806 из Lecture Notes in Computer Science, стр. 78-93. Springer, (2019)Reliable Password Hardening Service with Opt-Out., , и . SRDS, стр. 250-261. IEEE, (2022)Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.. CDC, стр. 5124-5127. IEEE, (2003)Performance Evaluation of a Collaborative Intrusion Detection System., и . ICNC (6), стр. 409-413. IEEE Computer Society, (2009)Security-Enhanced Timed-Release Encryption in the Random Oracle Model., , , , , и . SocialSec, том 1298 из Communications in Computer and Information Science, стр. 41-51. Springer, (2020)