From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism., , и . ICC, стр. 1-7. IEEE, (2021)MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW., , , , и . TrustCom, стр. 425-433. IEEE, (2020)Secrecy rates of binary wiretapper channels using feedback schemes., и . CISS, стр. 624-629. IEEE, (2008)HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks., , , и . ICT, стр. 549-553. IEEE, (2018)Evaluation of security robustness against information leakage in Gaussian polytree graphical models., , , и . WCNC, стр. 1404-1409. IEEE, (2015)Active eavesdropping in fast fading channels: A Block-Markov Wyner secrecy encoding scheme., и . ISIT, стр. 2508-2512. IEEE, (2010)A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR)., , , , и . CoRR, (2023)Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks., , и . CSoNet, том 13831 из Lecture Notes in Computer Science, стр. 167-178. Springer, (2022)Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4., , и . IJCNN, стр. 1-8. IEEE, (2024)Optimizing Privacy and Utility Tradeoffs for Group Interests Through Harmonization., , и . IJCNN, стр. 1-10. IEEE, (2024)