From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asymptotic Loss in Privacy due to Dependency in Gaussian Traces., , , , и . WCNC, стр. 1-6. IEEE, (2019)Robust Content-Based Video Watermarking Exploiting Motion Entropy Masking Effect., , и . SIGMAP, стр. 252-259. INSTICC Press, (2006)Nexat: a history-based approach to predict attacker actions., , , , и . ACSAC, стр. 383-392. ACM, (2011)IP over Voice-over-IP for censorship circumvention, , , и . CoRR, (2012)Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising., , и . CoRR, (2020)TagIt: Tagging Network Flows using Blind Fingerprints., и . Proc. Priv. Enhancing Technol., 2017 (4): 290-307 (2017)Practical Censorship Evasion Leveraging Content Delivery Networks., и . ACM Conference on Computer and Communications Security, стр. 1715-1726. ACM, (2016)The Perils of Learning From Unlabeled Data: Backdoor Attacks on Semi-supervised Learning., , и . CoRR, (2022)CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing, , , , и . CoRR, (2012)Secloud: A cloud-based comprehensive and lightweight security solution for smartphones., , , , и . Comput. Secur., (2013)