From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bone fragment segmentation from 3D CT imagery., и . Comput. Medical Imaging Graph., (2018)Language Model for Text Analytic in Cybersecurity., , , и . CoRR, (2022)VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification., , и . CNS, стр. 1-9. IEEE, (2023)ThreatZoom: CVE2CWE using Hierarchical Neural Network., , и . CoRR, (2020)ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification., , и . SecureComm (1), том 335 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 23-41. Springer, (2020)Automated CVE Analysis for Threat Prioritization and Impact Prediction., , , и . CoRR, (2023)A System for 3D Reconstruction Of Comminuted Tibial Plafond Bone Fractures., , , и . CoRR, (2021)SecureBERT: A Domain-Specific Language Model for Cybersecurity., , , и . SecureComm, том 462 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 39-56. Springer, (2022)