From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Comparison of Contemporary DNN Watermarking Techniques., , , , и . CoRR, (2018)A Unified Submodular Framework for Multimodal IC Trojan Detection., , и . Information Hiding, том 6387 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2010)Chime: Checkpointing Long Computations on Interm ittently Energized IoT Devices., , , и . IEEE Trans. Multi Scale Comput. Syst., 2 (4): 277-290 (2016)Behavioral synthesis techniques for intellectual property protection., , и . ACM Trans. Design Autom. Electr. Syst., 10 (3): 523-545 (2005)HypOp: Distributed Constrained Combinatorial Optimization leveraging Hypergraph Neural Networks., , , , и . CoRR, (2023)Tailor: Altering Skip Connections for Resource-Efficient Inference., , , , , , , , и . CoRR, (2023)An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors., , и . IEEE Trans. Computers, 64 (9): 2460-2475 (2015)Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers., , и . CoRR, (2022)Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints., , , , и . ACM Trans. Embed. Comput. Syst., 6 (3): 16 (2007)Decentralized Bayesian Learning over Graphs., , , , , и . CoRR, (2019)