From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pinned it! A Large Scale Study of the Pinterest Network., , , и . CODS, стр. 1-10. ACM, (2014)Using semantic technologies to mine vehicular context for security., , и . Sarnoff Symposium, стр. 124-129. IEEE, (2016)Broker Bots: Analyzing automated activity during High Impact Events on Twitter., и . CoRR, (2014)Using Data Analytics to Detect Anomalous States in Vehicles., , и . CoRR, (2015)Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems.. Computer, 54 (2): 4-6 (2021)Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities., , , , , , , и . CoRR, (2023)Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions., , , , и . CoRR, (2024)Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems., , , , , , и . CoRR, (2024)Ontology driven AI and Access Control Systems for Smart Fisheries., , , , , и . SAT-CPS@CODASPY, стр. 59-68. ACM, (2021)Artificial Intelligence Assisted Malware Analysis., , и . SAT-CPS@CODASPY, стр. 75-77. ACM, (2021)