From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient privacy preserving content based publish subscribe systems., , и . SACMAT, стр. 133-144. ACM, (2012)DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference., , , , , и . ACM Trans. Priv. Secur., 26 (1): 9:1-9:32 (2023)Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns., , , , и . CODASPY, стр. 209-220. ACM, (2021)Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage., , , и . CoRR, (2017)GREENER: Graph Neural Networks for News Media Profiling., , , , и . EMNLP, стр. 7470-7480. Association for Computational Linguistics, (2022)Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions., , , и . SmartGridComm, стр. 324-329. IEEE, (2012)DBMask: Fine-Grained Access Control on Encrypted Relational Databases., , , и . CODASPY, стр. 1-11. ACM, (2015)A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs., , , , и . CoRR, (2022)Malicious and Low Credibility URLs on Twitter during COVID-19., , , , , и . CoRR, (2021)An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds., , , и . IEEE Trans. Knowl. Data Eng., 26 (9): 2107-2119 (2014)