From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Limitations of Deep Learning in Adversarial Settings., , , , , и . CoRR, (2015)Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering., , и . CoRR, (2015)Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks., , , , и . IEEE Symposium on Security and Privacy, стр. 582-597. IEEE Computer Society, (2016)Optimal Sensor Placement for Intruder Detection, , и . CoRR, (2011)Maximizing Coverage Centrality via Network Design: Extended Version., , , , и . CoRR, (2017)Dispatch-and-search: dynamic multi-ferry control in partitioned mobile networks., , и . MobiHoc, стр. 17. ACM, (2011)Let's Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds., , , , , и . CoRR, (2020)MACS: Deep Reinforcement Learning based SDN Controller Synchronization Policy Design., , , , , и . ICNP, стр. 1-11. IEEE, (2019)A diagnosis based intrusion detection approach., , , , , и . MILCOM, стр. 929-934. IEEE, (2015)Federated Learning for Coalition Operations., , , , , , , , , и 1 other автор(ы). CoRR, (2019)