Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach., , and . CSR, page 432-439. IEEE, (2023)Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models., , , and . TPS-ISA, page 91-100. IEEE, (2023)A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection., , , , , and . SMC, page 1927-1934. IEEE, (2021)Adversarial Attacks on Deep Learning-Based UAV Navigation Systems., , , and . CNS, page 1-6. IEEE, (2023)Securing Smart Grid False Data Detectors Against White-Box Evasion Attacks Without Sacrificing Accuracy., , , , , and . IEEE Internet Things J., 11 (20): 33873-33889 (October 2024)Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework., , , , and . IJCNN, page 1-8. IEEE, (2022)Blockchain-based Smart Supply Chain Management., , and . DSA, page 203-208. IEEE, (2022)Trojan Attack and Defense for Deep Learning-Based Navigation Systems of Unmanned Aerial Vehicles., , , , , and . IEEE Access, (2024)ASTD: Arabic Sentiment Tweets Dataset., , and . EMNLP, page 2515-2519. The Association for Computational Linguistics, (2015)Smart Supply Chain Management with Attribute-Based Encryption Access Control., and . CCWC, page 198-204. IEEE, (2023)