From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization., , , , , и . Neurocomputing, (2018)ARG: Automatic ROP Chains Generation., , , , , , и . IEEE Access, (2019)Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection., , , и . IEEE Trans. Ind. Informatics, 20 (3): 4627-4639 (марта 2024)Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs., , , , и . Comput. Stand. Interfaces, (2018)VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network., , , и . Computer, 56 (10): 49-61 (октября 2023)An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template., , и . PCM, том 4261 из Lecture Notes in Computer Science, стр. 31-40. Springer, (2006)Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension., , и . CoRR, (2019)A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting., , , , и . Appl. Soft Comput., (2022)A kernel stack protection model against attacks from kernel execution units., , , , и . Comput. Secur., (2018)Robust boosting via self-sampling., , и . Knowl. Based Syst., (2020)