From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deriving Differentially Private Session Logs for Query Suggestion., и . ICTIR, стр. 51-58. ACM, (2017)A General Arthropod Joint Model and its Applications in Modeling Human Robotic Joints., , , , , , , и . IEEE Access, (2021)A Robust CycleGAN-L2 Defense Method for Speaker Recognition System., , , и . IEEE Access, (2023)A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity., , и . IEEE Access, (2020)A Novel Underactuated Robotic Finger with Variable Stiffness Joints., , , , , и . EMBC, стр. 5305-5309. IEEE, (2019)A Novel Variable Stiffness Compliant Finger Exoskeleton for Rehabilitation Based on Electromagnet Control., , , и . EMBC, стр. 3926-3929. IEEE, (2018)Applying the Query Change Retrieval Model on Session Search-Georgetown at TREC 2013 Session Track., и . TREC, том 500-302 из NIST Special Publication, National Institute of Standards and Technology (NIST), (2013)DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis., , , , и . Secur. Commun. Networks, (2020)Generating risk reduction recommendations to decrease vulnerability of public online profiles., , , , и . ASONAM, стр. 411-416. IEEE Computer Society, (2016)Amplification methods to promote the attacks against machine learning-based intrusion detection systems., , , и . Appl. Intell., 54 (4): 2941-2961 (2024)