Follow
Felix Viktor Jedrzejewski
Title
Cited by
Cited by
Year
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems
L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ...
Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security …, 2018
242018
MLSMM: Machine Learning Security Maturity Model
F Jedrzejewski, D Fucci, O Adamov
arXiv preprint arXiv:2306.16127, 2023
2023
Privacy-Preserving Natural Language Processing: A Systematic Mapping Study
FV Jedrzejewski
The system can't perform the operation now. Try again later.
Articles 1–3