From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks., , и . CCS, стр. 3387-3389. ACM, (2022)AdFlush: A Real-World Deployable Machine Learning Solution for Effective Advertisement and Web Tracker Prevention., , , , и . WWW, стр. 1902-1913. ACM, (2024)Cultural dimensions for user experience: cross-country and cross-product analysis of users' cultural characteristics., , , , , , , , и . BCS HCI (1), стр. 3-12. BCS, (2008)The Cost Model for XML Documents in Relational Database Systems., , и . AICCSA, стр. 185-187. IEEE Computer Society, (2001)Filtering XML Target Documents for EDMS., и . ISDB, стр. 222-227. Acta Press, (2002)Automatic program debugging system for programming language tutoring system., и . CATA, стр. 50-53. ISCA, (1998)Wideband LC VCO with 39.3 % Frequency Tuning Range for Dielectric Spectroscopy System., , , и . ISOCC, стр. 39-40. IEEE, (2021)Object-Oriented Visual Language Grammar and its Parsing Algorithm., и . VL, стр. 86-87. IEEE Computer Society, (1998)Preparations for Semantics-Based XML Mining., , и . ICDM, стр. 345-352. IEEE Computer Society, (2001)An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection., , , , , , и . USENIX Security Symposium, USENIX Association, (2024)