From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection under Privileged Information., , , , , , и . AsiaCCS, стр. 199-206. ACM, (2018)Curie: Policy-based Secure Data Exchange., , , , , и . CODASPY, стр. 121-132. ACM, (2019)Measuring and Mitigating the Risk of IP Reuse on Public Clouds., , , , , и . SP, стр. 558-575. IEEE, (2022)Application Transiency: Towards a Fair Trade of Personal Information for Application Services., , , и . SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 47-66. Springer, (2019)Systematic Evaluation of Geolocation Privacy Mechanisms., , , , , , и . CoRR, (2023)Characterizing the Modification Space of Signature IDS Rules., , , , и . MILCOM, стр. 536-541. IEEE, (2023)On the Robustness of Domain Constraints., , , , , и . CCS, стр. 495-515. ACM, (2021)Generating Practical Adversarial Network Traffic Flows Using NIDSGAN., , , , , , и . CoRR, (2022)Building a Privacy-Preserving Smart Camera System., , , , , , , и . CoRR, (2022)Improving Radioactive Material Localization by Leveraging Cyber-Security Model Optimizations., , , и . CoRR, (2022)