From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Governing AI safety through independent audits., , , , , , , , , и 10 other автор(ы). Nat. Mach. Intell., 3 (7): 566-571 (2021)Do we really need to catch them all? A new User-guided Social Media Crawling method., , , и . CoRR, (2016)A Socially-Aware Operating System for Trustworthy Computing., , , , , и . ICSC, стр. 380-386. IEEE Computer Society, (2011)SIN: A Platform to Make Interactions in Social Networks Accessible., , , , , и . SocialInformatics, стр. 205-214. IEEE Computer Society, (2012)Read What You Trust: An Open Wiki Model Enhanced by Social Context., , , , и . SocialCom/PASSAT, стр. 370-379. IEEE Computer Society, (2011)Leveraging Social Interactions to Suggest Friends., , , и . ICDCS Workshops, стр. 386-391. IEEE Computer Society, (2013)A Cloud Theory-Based Trust Computing Model in Social Networks., , , , и . Entropy, 19 (1): 11 (2017)TCPtransform: Property-Oriented TCP Traffic Transformation., , , , , , и . DIMVA, том 3548 из Lecture Notes in Computer Science, стр. 222-240. Springer, (2005)SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11., , , , , и . GLOBECOM, стр. 768-772. IEEE, (2002)Trustworthy opportunistic sensing: A Social Computing Paradigm., , , и . IRI, стр. 513-518. IEEE Systems, Man, and Cybernetics Society, (2011)