From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , и . SDM, стр. 693-701. SIAM, (2022)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , и . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (февраля 2024)iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow., , , , , и . ASONAM, стр. 1097-1104. ACM, (2019)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , и . IJCNN, стр. 1-8. IEEE, (2021)Automatic Detection of Helmet Uses for Construction Safety., , , , , , и . WI Workshops, стр. 135-142. IEEE Computer Society, (2016)Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models., , и . TrustCom, стр. 1606-1613. IEEE, (2023)AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection., , , , , , , и . CoRR, (2018)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , и . SIGIR, стр. 2024-2028. ACM, (2022)SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks., и . Australasian Conference on Artificial Intelligence, том 10400 из Lecture Notes in Computer Science, стр. 76-89. Springer, (2017)Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining., , , и . SEKE, стр. 293-298. KSI Research Inc., (2020)