Author of the publication

An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm.

, , , , and . Comput., 9 (3): 58 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach for analysis of attack graph., , , and . ISI, page 7-12. IEEE, (2017)Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS)., , , , and . IEEE Access, (2024)An Adversarial Attack Detection Paradigm With Swarm Optimization., , , , and . IJCNN, page 1-7. IEEE, (2020)A Reinforcement Learning Approach for Attack Graph Analysis., , , and . TrustCom/BigDataSE, page 212-217. IEEE, (2018)An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm., , , , and . Comput., 9 (3): 58 (2020)Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan Environment., , , , and . UCET, page 1-4. IEEE, (2020)Enhancing Security Awareness Through Gamified Approaches., , , , , and . CoRR, (2024)RTMCH: real-time multichannel MAC for wireless video sensor networks., , and . Multimedia Tools Appl., 78 (6): 7803-7818 (2019)A Practical Approach to Tracking Estimation Using Object Trajectory Linearization., , , and . Int. J. Comput. Intell. Syst., 17 (1): 175 (December 2024)