From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , и . INFOCOM, стр. 1091-1099. IEEE, (2010)Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , и . AsiaCCS, стр. 8-9. ACM, (2012)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , и . NDSS, The Internet Society, (2011)Heterogeneous Graph Matching Networks for Unknown Malware Detection., , , , , , , , , и . IJCAI, стр. 3762-3770. ijcai.org, (2019)Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification., , , , , , , , и . SDM, стр. 693-701. SIAM, (2019)Seismic Qualification of Telecommunication System in Nuclear Power Plant., и . ICGEC, том 329 из Advances in Intelligent Systems and Computing, стр. 353-358. Springer, (2014)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , и . AsiaCCS, стр. 543-554. ACM, (2015)High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , и . CCS, стр. 504-516. ACM, (2016)Detecting and characterizing social spam campaigns., , , , , и . ACM Conference on Computer and Communications Security, стр. 681-683. ACM, (2010)TINET: Learning Invariant Networks via Knowledge Transfer., , , , , , и . KDD, стр. 1890-1899. ACM, (2018)