<?xml version="1.0"?>
<dblpperson name="V. V. Platonov" pid="175/0120" n="9">
<person key="homepages/175/0120" mdate="2016-01-28">
<author pid="175/0120">V. V. Platonov</author>
</person>
<r><article key="journals/accs/PlatonovSYA25" mdate="2026-03-05">
<author pid="175/0120">V. V. Platonov</author>
<author pid="175/0062">A. F. Suprun</author>
<author pid="428/6723">Ya. E. Yanbarisova</author>
<author pid="194/6092">V. G. Anisimov</author>
<title>Application of a Genetic Algorithm for Selecting Neural Network Hyperparameters.</title>
<year>2025</year>
<month>December</month>
<pages>1357-1363</pages>
<volume>59</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411625700907</ee>
<url>db/journals/accs/accs59.html#PlatonovSYA25</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/KalininMP24" mdate="2025-12-07">
<author orcid="0000-0002-9732-0099" pid="60/2978">Maxim O. Kalinin</author>
<author pid="401/4780">A. A. Muryleva</author>
<author pid="175/0120">V. V. Platonov</author>
<title>Protecting Machine Learning Models from Training Data Set Extraction.</title>
<pages>1234-1241</pages>
<year>2024</year>
<month>December</month>
<volume>58</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411624700871</ee>
<url>db/journals/accs/accs58.html#KalininMP24</url>
<stream>streams/journals/accs</stream>
</article>
</r>
<r><article key="journals/accs/PlatonovG23" mdate="2024-03-13">
<author pid="175/0120">V. V. Platonov</author>
<author pid="370/3639">N. M. Grigorjeva</author>
<title>Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder.</title>
<pages>989-995</pages>
<year>2023</year>
<month>December</month>
<volume>57</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411623080230</ee>
<url>db/journals/accs/accs57.html#PlatonovG23</url>
</article>
</r>
<r><article key="journals/accs/KulikovP21" mdate="2022-03-04">
<author pid="314/8964">D. A. Kulikov</author>
<author pid="175/0120">V. V. Platonov</author>
<title>Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier.</title>
<pages>1080-1086</pages>
<year>2021</year>
<volume>55</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411621080174</ee>
<url>db/journals/accs/accs55.html#KulikovP21</url>
</article>
</r>
<r><article key="journals/accs/PopovaP20" mdate="2021-02-24">
<author pid="259/9435">E. A. Popova</author>
<author pid="175/0120">V. V. Platonov</author>
<title>Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems.</title>
<pages>907-914</pages>
<year>2020</year>
<volume>54</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411620080295</ee>
<url>db/journals/accs/accs54.html#PopovaP20</url>
</article>
</r>
<r><article key="journals/accs/PlatonovS18" mdate="2020-05-11">
<author pid="175/0120">V. V. Platonov</author>
<author pid="175/0158">P. O. Semenov</author>
<title>Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices.</title>
<pages>959-964</pages>
<year>2018</year>
<volume>52</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411618080217</ee>
<url>db/journals/accs/accs52.html#PlatonovS18</url>
</article>
</r>
<r><article key="journals/accs/PlatonovS17" mdate="2025-01-19">
<author pid="175/0120">V. V. Platonov</author>
<author pid="175/0158">P. O. Semenov</author>
<title>An adaptive model of a distributed intrusion detection system.</title>
<pages>894-898</pages>
<year>2017</year>
<volume>51</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411617080168</ee>
<ee>https://www.wikidata.org/entity/Q130169684</ee>
<url>db/journals/accs/accs51.html#PlatonovS17</url>
</article>
</r>
<r><article key="journals/accs/AlekseevP17" mdate="2023-10-21">
<author pid="215/8298">I. V. Alekseev</author>
<author pid="175/0120">V. V. Platonov</author>
<title>Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences.</title>
<pages>915-920</pages>
<year>2017</year>
<volume>51</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411617080041</ee>
<ee>https://www.wikidata.org/entity/Q122398631</ee>
<url>db/journals/accs/accs51.html#AlekseevP17</url>
</article>
</r>
<r><article key="journals/accs/PlatonovS15" mdate="2020-05-11">
<author pid="175/0120">V. V. Platonov</author>
<author pid="175/0158">P. O. Semenov</author>
<title>Using data-mining methods to detect network attacks.</title>
<pages>766-769</pages>
<year>2015</year>
<volume>49</volume>
<journal>Autom. Control. Comput. Sci.</journal>
<number>8</number>
<ee>https://doi.org/10.3103/S0146411615080131</ee>
<url>db/journals/accs/accs49.html#PlatonovS15</url>
</article>
</r>
<coauthors n="10" nc="1">
<co c="-1"><na f="a/Alekseev:I=_V=" pid="215/8298">I. V. Alekseev</na></co>
<co c="0"><na f="a/Anisimov:V=_G=" pid="194/6092">V. G. Anisimov</na></co>
<co c="-1"><na f="g/Grigorjeva:N=_M=" pid="370/3639">N. M. Grigorjeva</na></co>
<co c="0"><na f="k/Kalinin:Maxim_O=" pid="60/2978">Maxim O. Kalinin</na></co>
<co c="-1"><na f="k/Kulikov:D=_A=" pid="314/8964">D. A. Kulikov</na></co>
<co c="0"><na f="m/Muryleva:A=_A=" pid="401/4780">A. A. Muryleva</na></co>
<co c="-1"><na f="p/Popova:E=_A=" pid="259/9435">E. A. Popova</na></co>
<co c="-1"><na f="s/Semenov:P=_O=" pid="175/0158">P. O. Semenov</na></co>
<co c="0"><na f="s/Suprun:A=_F=" pid="175/0062">A. F. Suprun</na></co>
<co c="0"><na f="y/Yanbarisova:Ya=_E=" pid="428/6723">Ya. E. Yanbarisova</na></co>
</coauthors>
</dblpperson>

