Author of the publication

Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus.

, , , , and . SenSys, page 505-510. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to chemical agent detection, classification, and estimation., , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730K. SPIE, (2008)Analysis and visualization of large complex attack graphs for networks security., , , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6570 of SPIE Proceedings, page 657004. SPIE, (2007)Context Assumptions for Threat Assessment Systems., and . Context-Enhanced Information Fusion, Springer, (2016)Navigation and Estimation Improvement by Environmental-Driven Noise Mode Detection., , , and . PLANS, page 925-932. IEEE, (2020)A Study of Lightweight DDDAS Architecture for Real-Time Public Safety Applications Through Hybrid Simulation., , , and . WSC, page 762-773. IEEE, (2019)Special Issue: Dynamic Data-Driven Applications Systems (DDDAS) Concepts in Signal Processing., and . J. Signal Process. Syst., 88 (2): 203-204 (2017)Optimal Placement of Heterogeneous Sensors for Targets with Gaussian Priors., , , and . IEEE Trans. Aerosp. Electron. Syst., 49 (3): 1637-1653 (2013)SGCast: A New Forecasting Framework for Multilocation Geomagnetic Data With Missing Traces Based on Matrix Factorization., , , , , , and . IEEE Trans. Instrum. Meas., (2021)Detecting Compromised Edge Smart Cameras using Lightweight Environmental Fingerprint Consensus., , , , and . SenSys, page 505-510. ACM, (2021)Deep Learning Approach for Data and Computing Efficient Disaster Mitigation in Humanitarian Assistance and Disaster Response Applications., , , , and . IHTC, page 79-85. IEEE, (2022)