From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Perturbation with ResNet., , , , и . ACM Great Lakes Symposium on VLSI, стр. 549-554. ACM, (2020)Interactive Teaching Reform for "Principles of Automatic Control" Course Based on Professional Cases., , , , и . EDUCON, стр. 1-5. IEEE, (2023)DRoT: A Decentralised Root of Trust for Trusted Networks., , , , , и . ICICS, том 14252 из Lecture Notes in Computer Science, стр. 683-701. Springer, (2023)Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme., и . IMACC, том 3796 из Lecture Notes in Computer Science, стр. 442-459. Springer, (2005)A trusted process to digitally sign a document., , , и . NSPW, стр. 79-86. ACM, (2001)Symmetric Variational Autoencoder and Connections to Adversarial Learning., , , , , и . CoRR, (2017)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , и . J. Parallel Distributed Comput., (2019)A DAA Scheme Requiring Less TPM Resources.. IACR Cryptol. ePrint Arch., (2010)Hash-Based Direct Anonymous Attestation., , , , и . PQCrypto, том 14154 из Lecture Notes in Computer Science, стр. 565-600. Springer, (2023)07421 Executive Summary -- Formal Protocol Verification Applied., , и . Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)