From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Limitations of Deep Learning in Adversarial Settings., , , , , и . CoRR, (2015)Multi-User Multi-Device-Aware Access Control System for Smart Home., , , , , , , и . CoRR, (2019)Discovering Physical Interaction Vulnerabilities in IoT Deployments., , , , , и . CoRR, (2021)ZBCAN: A Zero-Byte CAN Defense System., , , , , , и . USENIX Security Symposium, стр. 6893-6910. USENIX Association, (2023)Salting Public Traces with Attack Traffic to Test Flow Classifiers., , , и . CSET, USENIX Association, (2011)Real-time Analysis of Privacy-(un)aware IoT Applications., , , и . Proc. Priv. Enhancing Technol., 2021 (1): 145-166 (2021)IoTRepair: Flexible Fault Handling in Diverse IoT Deployments., , , , , , и . ACM Trans. Internet Things, 3 (3): 22:1-22:33 (2022)Detection under Privileged Information., , , , , , и . AsiaCCS, стр. 199-206. ACM, (2018)What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors., , и . CoRR, (2020)On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities., , , , и . CNS, стр. 1-6. IEEE, (2020)