Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1526-1539 (2022)A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context., , and . CoRR, (2022)Robust Training Using Natural Transformation., , , , , and . CoRR, (2021)SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market., , , and . CoRR, (2023)Adversarial Defense by Latent Style Transformations., , , , , and . CoRR, (2020)A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection., , , , , and . CoRR, (2024)Cybersecurity in Pacific Island nations., , and . Commun. ACM, 63 (4): 53-54 (2020)Security knowledge representation artifacts for creating secure IT systems., , , and . Comput. Secur., (2017)Authentication and Access Control in 5G Device-to-Device Communication., , and . TrustCom, page 1575-1582. IEEE, (2021)CeMoSS - Certification and Model-Driven Development of Safe and Secure Software., , and . Software Engineering, volume P-227 of LNI, page 207-208. GI, (2014)