From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities., , , , и . CNS, стр. 1-6. IEEE, (2020)What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors., , и . CoRR, (2020)Detection under Privileged Information., , , , , , и . AsiaCCS, стр. 199-206. ACM, (2018)IoTRepair: Systematically Addressing Device Faults in Commodity IoT (Extended Paper)., , , , , , и . CoRR, (2020)New Metrics to Evaluate the Performance and Fairness of Personalized Federated Learning., , , и . CoRR, (2021)S3: Side-Channel Attack on Stylus Pencil through Sensors., , , , , и . CoRR, (2021)One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices., , , и . SP, стр. 3026-3042. IEEE, (2023)PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles., , , , и . SP, стр. 1826-1844. IEEE, (2022)Curie: Policy-based Secure Data Exchange., , , , , и . CODASPY, стр. 121-132. ACM, (2019)Discovering IoT Physical Channel Vulnerabilities., , , , , и . CCS, стр. 2415-2428. ACM, (2022)