From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling Social Engineering Botnet Dynamics across Multiple Social Networks., , , , , и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 261-272. Springer, (2012)Botnet spoofing: fighting botnet with itself., , , , и . Secur. Commun. Networks, 8 (1): 80-89 (2015)Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example., , и . IEEE Trans. Parallel Distributed Syst., 30 (7): 1596-1612 (2019)Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data., , и . IEEE Trans. Parallel Distributed Syst., 31 (9): 2220-2231 (2020)Optimizing genomic control in mixed model associations with binary diseases., , , , , и . Briefings Bioinform., (2022)A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation., , , , , , , и . HPCC/DSS/SmartCity/DependSys, стр. 285-294. IEEE, (2022)An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble., , , , , и . ISCC, стр. 1214-1220. IEEE, (2023)CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2022)Software Vulnerability Detection Using an Enhanced Generalization Strategy., , , , , и . SETTA, том 14464 из Lecture Notes in Computer Science, стр. 226-242. Springer, (2023)Exploring Efficient and Robust Virtual Machine Introspection Techniques., , , , , и . ICA3PP (3), том 9530 из Lecture Notes in Computer Science, стр. 429-448. Springer, (2015)