Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordinated Container Migration and Base Station Handover in Mobile Edge Computing., , , and . GLOBECOM, page 1-6. IEEE, (2020)Enabling intelligence in fog computing to achieve energy and latency reduction., , , , and . Digit. Commun. Networks, 5 (1): 3-9 (2019)A Novel Feature Vector for AI-Assisted Windows Malware Detection., , , , , , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 355-361. IEEE, (2023)Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning., , , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 503-531. Springer, (2023)Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing., , , and . ICDCS, page 1227-1230. IEEE, (2020)Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning., , , , and . CoRR, (2022)Dense Deployment of BLE-Based Body Area Networks: A Coexistence Study., , , , and . TGCN, 2 (4): 972-981 (2018)Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach., , and . CoRR, (2021)Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach., , and . ACM Trans. Internet Things, 3 (1): 4:1-4:23 (2022)Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning., , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 445-465. Springer, (2022)