From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis., и . CoRR, (2015)Understanding Membership Inferences on Well-Generalized Learning Models., , , , , , , и . CoRR, (2018)A computational approach toward label-free protein quantification using predicted peptide detectability., , , , , , , и . ISMB (Supplement of Bioinformatics), стр. 481-488. (2006)Towards Fair Cross-Domain Adaptation via Generative Learning., , , , и . CoRR, (2020)Learning your identity and disease from research papers: information leaks in genome wide association study., , , , и . ACM Conference on Computer and Communications Security, стр. 534-544. ACM, (2009)Protein Domain Embeddings for Fast and Accurate Similarity Search., , и . RECOMB, том 14758 из Lecture Notes in Computer Science, стр. 421-424. Springer, (2024)FairFix: Enhancing Fairness of Pre-Trained Deep Neural Networks with Scarce Data Resources., , , , , , , , , и 3 other автор(ы). IDS, стр. 14-20. IEEE, (2024)Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning., , , , , , , и . USENIX Security Symposium, стр. 3529-3545. USENIX Association, (2023)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , и . CCS, стр. 2421-2434. ACM, (2017)Practical and Efficient in-Enclave Verification of Privacy Compliance., , , , , , , , , и . DSN, стр. 413-425. IEEE, (2021)