From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Temporal Debiasing using Adversarial Loss based GNN architecture for Crypto Fraud Detection., , , , и . ICMLA, стр. 391-396. IEEE, (2021)Modeling approaches for Silent Attrition prediction in Payment networks., , , , , , и . ICMLA, стр. 409-414. IEEE, (2021)A Wireless Intrusion Detection System for 802.11 WPA3 Networks., , , , , и . COMSNETS, стр. 384-392. IEEE, (2022)Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking., , , и . CAV, том 1855 из Lecture Notes in Computer Science, стр. 124-138. Springer, (2000)Energy-aware systems for real-time job scheduling in cloud data centers: A deep reinforcement learning approach., , , , , , и . Comput. Electr. Eng., (2022)A slew rate enhancement technique for operational amplifiers based on a tunable active Gm-based capacitance multiplication circuit., , и . ACM Great Lakes Symposium on VLSI, стр. 273-276. ACM, (2003)SAT-Based Image Computation with Application in Reachability Analysis., , , и . FMCAD, том 1954 из Lecture Notes in Computer Science, стр. 354-371. Springer, (2000)An On-Chip Coupling Capacitance Measurement Technique., , и . VLSI Design, стр. 495-499. IEEE Computer Society, (2001)Reconsidering CEGAR: Learning Good Abstractions without Refinement., и . ICCD, стр. 591-598. IEEE Computer Society, (2005)Model Checking: Back and Forth between Hardware and Software., , , и . VSTTE, том 4171 из Lecture Notes in Computer Science, стр. 251-255. Springer, (2005)