From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks., , , , и . ARES, стр. 27:1-27:11. ACM, (2021)Asymmetric DCnets for Effective and Efficient Sender Anonymity., , и . GLOBECOM, стр. 1-7. IEEE, (2018)How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes., , , , и . USENIX Security Symposium, стр. 359-376. USENIX Association, (2022)Hide And Seek: Detecting Sensors In P2P Botnets, , , , и . IEEE Conference on Communications and Network Security, стр. 731--732. (2015)Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux., , , и . ACM Conference on Computer and Communications Security, стр. 2677-2679. ACM, (2019)Enhancing Privacy via Hierarchical Federated Learning., , , и . EuroS&P Workshops, стр. 344-347. IEEE, (2020)AVAIN - a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks., , , и . NetSys, стр. 1-3. IEEE, (2019)The Cost of Path Information: Routing in Anonymous Communication., , , и . CCNC, стр. 1-6. IEEE, (2021)Efficient privacy-preserving recommendations based on social graphs., , , и . RecSys, стр. 78-86. ACM, (2019)PNet: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks., , , , и . MobiQuitous, стр. 60-69. ACM, (2019)