From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , и . GraMSec@FLoC, том 11086 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2018)Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion).. Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 157-170. Springer, (2017)Security Engineering. Wiley Computer Publishing, (2001)The Taboo Trap: Behavioural Detection of Adversarial Samples., , , и . CoRR, (2018)CoverDrop: Blowing the Whistle Through A News App., , , , и . Proc. Priv. Enhancing Technol., 2022 (2): 47-67 (2022)A dynamic model of barter exchange., , , и . SODA, стр. 1925-1933. SIAM, (2015)Bad Characters: Imperceptible NLP Attacks., , , и . SP, стр. 1987-2004. IEEE, (2022)Talking Trojan: Analyzing an Industry-Wide Disclosure., и . SCORED@CCS, стр. 83-92. ACM, (2022)To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression., , , и . SysML, mlsys.org, (2019)To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression., , , и . CoRR, (2018)