From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Relations among Security Metrics for Template Protection Algorithms, и . CoRR, (2012)Robustness Bounds on the Successful Adversarial Examples: Theory and Practice., и . CoRR, (2024)CyExec*: Automatic Generation of Randomized Cyber Range Scenarios., и . ICISSP, стр. 226-236. SCITEPRESS, (2021)A training system for the MyoBock hand in a virtual reality environment., , , , , , , , и . BioCAS, стр. 61-64. IEEE, (2013)An Expert System for Classifying Harmful Content on the Dark Web., , , , и . ISI, стр. 1-6. IEEE, (2020)Unconditionally Secure Electronic Voting., и . Towards Trustworthy Elections, том 6000 из Lecture Notes in Computer Science, стр. 107-123. Springer, (2010)Theoretical vulnerabilities in map speaker adaptation., и . ICASSP, стр. 2042-2046. IEEE, (2017)New Attestation Based Security Architecture for In-Vehicle Communication., , , , , и . GLOBECOM, стр. 1909-1914. IEEE, (2008)Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy., , , , , и . SII, стр. 936-941. IEEE, (2017)Lightweight Privacy for Ubiquitous Devices., , и . SMC, стр. 1233-1237. IEEE, (2006)