From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cybersecurity in the Smart Grid: Practitioners' Perspective., и . CoRR, (2022)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , и . CoRR, (2022)Äre Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages., , , , и . WWW, стр. 1712-1723. ACM, (2024)Identifying malicious hosts involved in periodic communications., , , , и . NCA, стр. 11-18. IEEE Computer Society, (2017)On the Evaluation of Sequential Machine Learning for Network Intrusion Detection., , и . ARES, стр. 113:1-113:10. ACM, (2021)Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations., , , , , и . ESORICS (3), том 14346 из Lecture Notes in Computer Science, стр. 162-182. Springer, (2023)Scalable architecture for online prioritisation of cyber threats., , , , и . CyCon, стр. 1-18. IEEE, (2017)Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2., , , и . CoRR, (2022)The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems., , и . CoRR, (2022)Understanding the Process of Data Labeling in Cybersecurity., , и . CoRR, (2023)