From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Qualitative Investigation of Insecure Code Propagation from Online Forums., , и . SecDev, стр. 34-48. IEEE, (2019)Scheduling Mix-flows in Commodity Datacenters with Karuna., , , и . SIGCOMM, стр. 174-187. ACM, (2016)Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study., , , и . EuroS&P Workshops, стр. 210-219. IEEE, (2020)A quantitative benefit evaluation of code search platform for enterprises., , , , , , и . Sci. China Inf. Sci., 63 (9): 1-3 (2020)Hierarchical cluster based evaluation system for computer courses.. Clust. Comput., 22 (Supplement): 4135-4140 (2019)Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption., , , и . USENIX Security Symposium, стр. 447-464. USENIX Association, (2021)The Research of Metaverse Application in Intelligent Railway Passenger Station., , , , , и . METAVERSE, том 13737 из Lecture Notes in Computer Science, стр. 111-117. Springer, (2022)Greeny at Factify 2022: Ensemble Model with Optimized RoBERTa for Multi-Modal Fact Verification (short paper).. DE-FACTIFY@AAAI, том 3199 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)RepNet: Cutting Latency with Flow Replication in Data Center Networks., , , , , и . IEEE Trans. Serv. Comput., 14 (1): 248-261 (2021)Consensus and complementary regularized non-negative matrix factorization for multi-view image clustering., , , , и . Inf. Sci., (апреля 2023)