From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Unlearning of Features and Labels., , , и . NDSS, The Internet Society, (2023)Dos and Don'ts of Machine Learning in Computer Security., , , , , , , и . USENIX Security Symposium, стр. 3971-3988. USENIX Association, (2022)Convolutional Neural Networks for Movement Prediction in Videos., , и . GCPR, том 10496 из Lecture Notes in Computer Science, стр. 215-225. Springer, (2017)Applying Quarter-Vehicle Model Simulation for Road Elevation Measurements Utilizing the Vehicle Level Sensor., , , , , , и . VTC Fall, стр. 1-6. IEEE, (2020)Explaining Graph Neural Networks for Vulnerability Discovery., , , и . AISec@CCS, стр. 145-156. ACM, (2021)Detecting Various Road Damage Types in Global Countries Utilizing Faster R-CNN., , , , , , , и . IEEE BigData, стр. 5563-5571. IEEE, (2020)Security viewpoints on explainable machine learning.. Technical University of Berlin, Germany, (2024)TagVet: Vetting Malware Tags using Explainable Machine Learning., , , и . EuroSec@EuroSys, стр. 34-40. ACM, (2021)Concept of a Cloud State Modeling System for Lead-Acid Batteries: Theory and Prototyping., , , , , , и . ICEIC, стр. 1-4. IEEE, (2021)Evaluating Explanation Methods for Deep Learning in Security., , , и . EuroS&P, стр. 158-174. IEEE, (2020)