From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AI-CTO: Knowledge graph for automated and dependable software stack solution., , , , , , и . J. Intell. Fuzzy Syst., 40 (1): 799-812 (2021)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , и 1 other автор(ы). CoRR, (2022)Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art., , , , , , , , , и 2 other автор(ы). Comput. Secur., (мая 2023)VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities., , , , , , и . IJCAI, стр. 4665-4671. ijcai.org, (2019)Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience., , , и . SERE (Companion), стр. 227-228. IEEE, (2013)A Large-Scale Study on Vulnerabilities in Linux using Vtopia., , , , и . QRS Companion, стр. 1-10. IEEE, (2021)Droidrevealer: Automatically detecting Mysterious Codes in Android applications., , , , , и . DSC, стр. 535-536. IEEE, (2017)POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application., , , , , и . CCS, стр. 1690-1692. ACM, (2015)A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering., , , , и . ASE, стр. 307-318. IEEE, (2023)Label Inference Attacks Against Vertical Federated Learning., , , , , , , , и . USENIX Security Symposium, стр. 1397-1414. USENIX Association, (2022)