From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers., , , , и . CoRR, (2020)Demystifying Performance Regressions in String Solvers., , , , , , и . IEEE Trans. Software Eng., 49 (3): 947-961 (марта 2023)On the conceptualization of total disturbance and its profound implications., , , , и . Sci. China Inf. Sci., 63 (2): 129201 (2020)ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking., , , , и . CoRR, (2019)SEC4SR: A Security Analysis Platform for Speaker Recognition., , , , , и . CoRR, (2021)Secure Deep Learning Engineering: A Software Quality Assurance Perspective., , , , , , , , , и . CoRR, (2018)Predicting Entity Relations across Different Security Databases by Using Graph Attention Network., , , , , и . COMPSAC, стр. 834-843. IEEE, (2021)Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases., , , , , и . COMPSAC, стр. 1020-1025. IEEE, (2021)Towards Understanding the Faults of JavaScript-Based Deep Learning Systems., , , , , и . ASE, стр. 105:1-105:13. ACM, (2022)ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications., , , , , , и . ICSE, стр. 1695-1707. IEEE, (2021)