From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Neural processing of targets in visible, multispectral IR and SAR imagery., , , , , , , и . Neural Networks, 8 (7-8): 1029-1051 (1995)CoCoT: Collaborative Contact Tracing., , и . CODASPY, стр. 175-186. ACM, (2024)Improving Intrusion Detection Performance using Keyword Selection and Neural Networks., и . Recent Advances in Intrusion Detection, (1999)Catching MPC Cheaters: Identification and Openability., , и . IACR Cryptol. ePrint Arch., (2016)Detection of injected, dynamically generated, and obfuscated malicious code., , , и . WORM, стр. 76-82. ACM Press, (2003)IEEE SecDev 2016: Prioritizing Secure Development., , , , и . IEEE Secur. Priv., 14 (4): 82-84 (2016)Computing on masked data: a high performance method for improving big data veracity., , , , , , и . HPEC, стр. 1-6. IEEE, (2014)The Real Cost of Software Errors., и . IEEE Secur. Priv., 7 (2): 87-90 (2009)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , и . CSF, стр. 412-427. IEEE, (2022)Robust keys from physical unclonable functions., , , и . HOST, стр. 88-92. IEEE Computer Society, (2014)