Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Orchestration in Large-Scale IoT Systems., , , and . ICIOT, page 58-65. IEEE Computer Society, (2017)Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems., , , , , , , and . TPS-ISA, page 263-272. IEEE, (2020)A Framework for Evaluating Client Privacy Leakages in Federated Learning., , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 545-566. Springer, (2020)Machine to Machine Trust in the IoT Era., , , , and . TRUST@AAMAS, volume 1578 of CEUR Workshop Proceedings, page 18-29. CEUR-WS.org, (2016)Evolving Lvc To Include Evaluation Of Human-Ai Teaming Dynamics., and . WSC, page 2506-2517. IEEE, (2023)PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users., , , , , and . IEEE BigData, page 1238-1247. IEEE, (2018)A Framework for Evaluating Gradient Leakage Attacks in Federated Learning., , , , , , and . CoRR, (2020)Adversarial Deception in Deep Learning: Analysis and Mitigation., , , , , , and . TPS-ISA, page 236-245. IEEE, (2020)Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness., , , , , , and . MASS, page 274-282. IEEE, (2019)Cross-Layer Strategic Ensemble Defense Against Adversarial Examples., , , , , , and . ICNC, page 456-460. IEEE, (2020)