Author of the publication

Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks.

, , , , , and . IEEE Internet Things J., 10 (10): 8408-8415 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of tea using LED-induced fluorescence., , and . WOCC, page 607-609. IEEE, (2013)Detection and Location of Multiple Faults in Baseline Interconnection Networks., , and . IEEE Trans. Computers, 41 (10): 1340-1344 (1992)Data Driven Models for Human Motion Prediction in Human-Robot Collaboration., , , , and . IEEE Access, (2020)RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports., , , , and . CoRR, (2023)AVA-AVD: Audio-visual Speaker Diarization in the Wild., , , , and . CoRR, (2021)When Does UPW Model Become Invalid for XL-MIMO With Directional Array Elements?, and . IEEE Commun. Lett., 28 (2): 422-426 (February 2024)Detection of Android Malicious Family Based on Manifest Information., , , , and . ICCSE, page 202-205. IEEE, (2020)Perfect Gaussian Integer Sequence Pairs from Cyclic Difference Set Pairs., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (5): 855-858 (2018)Identifying stable fixed order systems from time and frequency response data., , and . ACC, page 1253-1259. IEEE, (2011)Protego: securing wireless communication via programmable metasurface., , , , , , , and . MobiCom, page 55-68. ACM, (2022)