Author of the publication

A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks.

, , , , , , and . Ad Hoc Networks, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applications of polarimetric decomposition technology in a dried up lake evolution., , , and . IGARSS, page 4499-4502. IEEE, (2010)A 16-classification partition of formula set F(S) in revised Kleene system W., , and . Soft Comput., 10 (2): 115-118 (2006)A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles., , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 253-267. Springer, (2019)Libra Critique Towards Global Decentralized Financial System., , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 661-672. Springer, (2019)Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1364-1370. IEEE, (2018)Generating trusted graphs for trust evaluation in online social networks., , and . Future Gener. Comput. Syst., (2014)Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks., , , and . Future Gener. Comput. Syst., (2017)Integrated semantics and logic metric spaces., and . Fuzzy Sets Syst., 136 (1): 71-91 (2003)Generalized consistency degrees of theories w.r.t. formulas in several standard complete logic systems., and . Fuzzy Sets Syst., 157 (15): 2058-2073 (2006)Outsourcing privacy-preserving social networks to a cloud., , , , and . INFOCOM, page 2886-2894. IEEE, (2013)