From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling and signal integrity analysis of silicon interposer channels based on MTL and KBNN., , , , , , , , , и . Microelectron. J., (2024)Modeling worms propagation on probability., , и . NSS, стр. 49-56. IEEE, (2011)The structure of communities in scale-free networks., , , , , и . Concurr. Comput. Pract. Exp., (2017)Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification., , , , , и . IEEE Trans. Cloud Comput., 11 (3): 2631-2645 (июля 2023)Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , и . CoRR, (2018)Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks., , , , , , , и . J. Comput. Sci., (2018)Detecting Union Type Confusion in Component Object Model., , , , , , , и . USENIX Security Symposium, стр. 4265-4281. USENIX Association, (2023)Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis., , , , , и . ICIRA (1), том 8917 из Lecture Notes in Computer Science, стр. 161-170. Springer, (2014)Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness., , , и . ML4CS, том 11806 из Lecture Notes in Computer Science, стр. 378-396. Springer, (2019)StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , и . SP, стр. 1631-1648. IEEE, (2023)