From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts., , и . IEEE Access, (2017)PPaaS: Privacy Preservation as a Service., , , , и . CoRR, (2020)Continuous authentication for VANET., , , , , и . Veh. Commun., (2020)Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware., , , , и . Future Internet, 15 (6): 214 (июня 2023)Compression Optimality of Asymmetric Numeral Systems., , , , , и . CoRR, (2022)Towards Web Phishing Detection Limitations and Mitigation., , , , , , и . CoRR, (2022)Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms., , , , , и . CoRR, (2022)Nash Equilibrium-Based Semantic Cache in Mobile Sensor Grid Database Systems., , , , , и . IEEE Trans. Syst. Man Cybern. Syst., 47 (9): 2550-2561 (2017)Physical publicly verifiable randomness from pulsars., , , , , , , , , и . Astron. Comput., (2022)Privacy preserving distributed machine learning with federated learning., , , , и . Comput. Commun., (2021)