From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

IntelliAV: Building an Effective On-Device Android Malware Detector., , и . CoRR, (2018)Reject option with multiple thresholds., , и . Pattern Recognit., 33 (12): 2099-2101 (2000)Special Issue ÄI for Cybersecurity: Robust Models for Authentication, Threat and Anomaly Detection"., и . Algorithms, 16 (7): 327 (июля 2023)Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis., , и . IEEE Trans. Dependable Secur. Comput., 9 (5): 714-726 (2012)DLLMiner: structural mining for malware detection., , , , и . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)Infinity-Norm Support Vector Machines Against Adversarial Label Contamination., , , , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 106-115. CEUR-WS.org, (2017)Methods for Designing Multiple Classifier Systems., , и . Multiple Classifier Systems, том 2096 из Lecture Notes in Computer Science, стр. 78-87. Springer, (2001)Network Intrusion Detection by Combining One-Class Classifiers., , и . ICIAP, том 3617 из Lecture Notes in Computer Science, стр. 58-65. Springer, (2005)HMM-Web: A Framework for the Detection of Attacks Against Web Applications., , и . ICC, стр. 1-6. IEEE, (2009)Query Shifting Based on Bayesian Decision Theory for Content-Based Image Retrieval., и . SSPR/SPR, том 2396 из Lecture Notes in Computer Science, стр. 607-616. Springer, (2002)