From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Impact of Deep Learning on Organizational Agility., , и . ICIS, Association for Information Systems, (2019)A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery., и . MASCOTS, стр. 69-76. IEEE Computer Society, (1998)An Effective Memory Optimization for Virtual Machine-Based Systems., и . IEEE Trans. Parallel Distributed Syst., 22 (10): 1705-1713 (2011)Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending., , , , и . IEEE Trans. Inf. Forensics Secur., 12 (1): 144-156 (2017)A Behavioral Biometrics Based Approach to Online Gender Classification., , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 475-495. Springer, (2016)An Investigation of Identity-Account Inconsistency in Single Sign-On., , и . WWW, стр. 105-117. ACM / IW3C2, (2021)Unveiling Privacy Setting Breaches in Online Social Networks., , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 323-341. Springer, (2013)A Voice Spam Filter to Clean Subscribers' Mailbox., , и . SecureComm, том 106 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 349-367. Springer, (2012)Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks., , , , и . WWW, стр. 1422-1432. ACM / IW3C2, (2020)On Energy Security of Smartphones., , , и . CODASPY, стр. 148-150. ACM, (2016)