From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization., , , , , , и . AISec@CCS, стр. 27-38. ACM, (2017)Mitigation of Adversarial Attacks through Embedded Feature Selection., , и . CoRR, (2018)Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis., и . SACMAT, стр. 231-238. ACM, (2017)Verification of Policy-Based Self-Managed Cell Interactions Using Alloy., , , и . POLICY, стр. 37-40. IEEE Computer Society, (2009)Towards Learning Privacy Policies., , и . POLICY, стр. 274. IEEE Computer Society, (2007)Decomposition techniques for policy refinement., , , , и . CNSM, стр. 72-79. IEEE, (2010)Learning User Behaviours in Real Mobile Domains., , , и . ILP (Late Breaking Papers), стр. 43-51. Imperial College Press / World Scientific, (2011)Next generation firewalls for dynamic coalitions., , , , , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1-6. IEEE, (2017)Byzantine-Robust Federated Machine Learning through Adaptive Model Averaging., , и . CoRR, (2019)Efficient Attack Graph Analysis through Approximate Inference., , , и . ACM Trans. Priv. Secur., 20 (3): 10:1-10:30 (2017)