From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust saliency maps with decoy-enhanced saliency score., , , и . CoRR, (2020)HackerRank: Identifying key hackers in underground forums., , , и . Int. J. Distributed Sens. Networks, 17 (5): 155014772110151 (2021)A framework for threat intelligence extraction and fusion., , , , , , и . Comput. Secur., (сентября 2023)The relational governance antecedents and loyalty consequence of service quality in crowdsourcing: The moderating role of crowdsourcing experience., , , и . Telematics Informatics, (2020)Location Error Analysis for Collaborative Beamforming in UAVs Random Array., , , , и . IEEE Wirel. Commun. Lett., 13 (3): 904-907 (марта 2024)Comprehensive Effects of Imperfect Synchronization and Channel Estimation on Known Interference Cancellation., , , , и . IEEE Trans. Veh. Technol., 69 (1): 457-470 (2020)JEBIN: analyzing gene co-expressions across multiple datasets by joint network embedding., , , , , , и . Briefings Bioinform., (2022)Decoding functional cell-cell communication events by multi-view graph learning on spatial transcriptomics., , , , , , и . Briefings Bioinform., (сентября 2023)TextGuard: Provable Defense against Backdoor Attacks on Text Classification., , , , и . CoRR, (2023)PATROL: Provable Defense against Adversarial Policy in Two-player Games., , , , и . USENIX Security Symposium, стр. 3943-3960. USENIX Association, (2023)