Author of the publication

Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication.

, , , , and . MobiHoc, page 388-393. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication., , , , and . MobiHoc, page 388-393. ACM, (2023)Trajectory Optimization for An Autonomous Vehicle Driving across Stochastic Traffic Flows based on Direct Collocation., , and . ICCAD, page 1-6. IEEE, (2020)Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks., , , and . TPS-ISA, page 168-177. IEEE, (2022)Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection., , and . SMC, page 20-25. IEEE, (2022)Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis., , and . IJCNN, page 1-8. IEEE, (2022)Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANs., , and . IJCNN, page 1-8. IEEE, (2020)Minimal Positive Realizations of Third-Order Systems with Complex Poles., , , and . POSTA, volume 341 of Lecture Notes in Control and Information Sciences, page 327-334. Springer, (2006)Remembering Transformer for Continual Learning., , , , and . CoRR, (2024)A Note on Minimal Positive Realizations of Continuous-Time Linear Systems., , and . ICNSC, page 123-128. IEEE, (2007)Blockchain-Based Federated Learning Against End-Point Adversarial Data Corruption., , and . ICMLA, page 729-734. IEEE, (2020)