From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review., , и . CoRR, (2022)A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception., , , , и . CoRR, (2022)From data flows to privacy-benefit trade-offs: A user-centric semantic model., и . Secur. Priv., (2022)Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework., , , и . MM&Sec, стр. 121-130. ACM, (2011)The Shadowy Lives of Emojis: An Analysis of a Hacktivist Collective's Use of Emojis on Twitter., , и . ICWSM Workshops, (2021)Behind the Mask: A Computational Study of Anonymous' Presence on Twitter., , и . ICWSM, стр. 327-338. AAAI Press, (2020)How National CSIRTs Operate: Personal Observations and Opinions from MyCERT., , , и . DSC, стр. 1-2. IEEE, (2022)jCAPTCHA: Accessible Human Validation., , и . ICCHP (1), том 8547 из Lecture Notes in Computer Science, стр. 129-136. Springer, (2014)Proof of Swarm Based Ensemble Learning for Federated Learning Applications., , , и . SAC, стр. 152-155. ACM, (2023)On Iterated Numerical Integration., , и . International Conference on Computational Science (1), том 3514 из Lecture Notes in Computer Science, стр. 123-130. Springer, (2005)