From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A survey of attack and defense techniques for reputation systems., , и . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)Entropy attacks and countermeasures in wireless network coding., , и . WISEC, стр. 185-196. ACM, (2012)Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption., и . CT-RSA, том 2271 из Lecture Notes in Computer Science, стр. 182-199. Springer, (2002)Secure Group Communication Using Robust Contributory Key Agreement., , , , , и . IEEE Trans. Parallel Distributed Syst., 15 (5): 468-480 (2004)SABRE: Robust Bayesian Peer-to-Peer Federated Learning., , , , и . CoRR, (2023)Security of electrostatic field persistent routing: Attacks and defense mechanisms., , , и . Ad Hoc Networks, (2016)Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach., , , , и . NDSS, The Internet Society, (2018)Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols., , , и . AAAI, стр. 9478-9483. AAAI Press, (2019)A multi-expertise application-driven class., , и . SIGCSE, стр. 119-123. ACM, (2007)Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 7 (1): 80-93 (2010)