From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)Disequilibrium: Tor's Exit Node Selection under the Stereoscope., , и . TrustCom/BigDataSE/ISPA (1), стр. 942-949. IEEE, (2015)A Revised Attack Taxonomy for a New Generation of Smart Attacks., , и . Computer and Information Science, 7 (3): 18-30 (2014)Service Management Platform: The Next Step in Management Tools.. DSOM, том 1960 из Lecture Notes in Computer Science, стр. 59-70. Springer, (2000)Towards an Accounting System for Multi-Provider Grid Environments., , , и . Integrated Network Management, стр. 60-69. IEEE, (2007)A User-Centric Approach to Automated Service Provisioning., и . Integrated Network Management, стр. 273-276. IEEE, (2001)Veranstaltung zum Tagungsmotto: Sicherheit.. GI Jahrestagung (2), том P-134 из LNI, стр. 992-993. GI, (2008)Content Driven Profile Matching across Online Social Networks., , и . ASONAM, стр. 1049-1055. ACM, (2017)One-Class Learning on Temporal Graphs for Attack Detection in Cyber-Physical Systems., , , , и . NOMS, стр. 1-5. IEEE, (2024)WebGL-based Image Processing through JavaScript Injection., , и . Web3D, стр. 20:1-20:5. ACM, (2024)