Author of the publication

Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification.

, , , and . COMPSAC, page 940-945. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Initial Design of Two-Stage Acoustic Vehicle Detection System for High Traffic Roads., , , , , , and . PerCom Workshops, page 1-6. IEEE, (2020)Design Of Ble 2-Step Separate Channel Fingerprinting., , , , and . VTC Spring, page 1-6. IEEE, (2020)SAVeD: Acoustic Vehicle Detector with Speed Estimation capable of Sequential Vehicle Detection., , , , and . ITSC, page 906-912. IEEE, (2018)Design of WiFi-AP operating channel estimation scheme for sensor node., , , , and . ICMU, page 1-6. IEEE, (2016)Poster abstract: high throughput data collection with topology adaptability in wireless sensor network., , , , and . IPSN, page 343-344. ACM, (2013)Design of Acoustic Vehicle Detector with Steady-Noise Suppression., , , , and . ITSC, page 2848-2853. IEEE, (2019)Unsupervised Learning of Domain-Independent User Attributes., , , , , , and . IEEE Access, (2022)C-AVDI: Compressive Measurement-Based Acoustic Vehicle Detection and Identification., , and . IEEE Access, (2021)Experimental Evaluation of LDoS Attacks on QUIC., , , and . ICMU, page 1-4. IEEE, (2023)Implementation of On-Demand Indoor Location-Based Service Using Ad Hoc Wireless Positioning Network., , , , , and . UIC/ATC/ScalCom, page 34-41. IEEE Computer Society, (2014)