Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications., , , , and . CCNC, page 956-962. IEEE, (2024)Micro-Operator driven Local 5G Network Architecture for Industrial Internet., , , , , and . CoRR, (2018)Performance Analysis of Softwarized Local Mobile Networks., , , and . CCNC, page 1-2. IEEE, (2021)AI and 6G Security: Opportunities and Challenges., , , and . EuCNC/6G Summit, page 616-621. IEEE, (2021)Robust and Resilient Federated Learning for Securing Future Networks., , , and . EuCNC, page 351-356. IEEE, (2022)Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks., , , , and . EuCNC, page 345-350. IEEE, (2022)Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems., , , , , and . CCNC, page 950-955. IEEE, (2024)Performance Analysis of Local 5G Operator Architectures for Industrial Internet., , , and . IEEE Internet Things J., 7 (12): 11559-11575 (2020)Deployment Options of 5G Network Slicing for Smart Healthcare., , , , and . CCNC, page 749-750. IEEE, (2022)A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects., , , and . IEEE Commun. Surv. Tutorials, 23 (2): 1160-1192 (2021)