Author of the publication

Cyber-Physical Simulation Testbed for MadIoT Attack Detection and Mitigation.

, , and . SIGSIM-PADS, page 59-60. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Single-Supply Buffer-Embedding SAR ADC with Skip-Reset having Inherent Chopping Capability., , , , , , , , , and . A-SSCC, page 189-192. IEEE, (2019)Towards Understanding Cryptocurrency Derivatives: A Case Study of BitMEX., , , , , and . WWW, page 45-57. ACM / IW3C2, (2021)Cube Padding for Weakly-Supervised Saliency Prediction in 360° Videos., , , , , and . CVPR, page 1420-1429. Computer Vision Foundation / IEEE Computer Society, (2018)PPP-Net: Platform-aware Progressive Search for Pareto-optimal Neural Architectures., , , , and . ICLR (Workshop), OpenReview.net, (2018)On recruiting and retaining users for security-sensitive longitudinal measurement panels., , , , , , and . SOUPS @ USENIX Security Symposium, page 347-366. USENIX Association, (2022)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)Secure control systems with application to cyber-physical systems., , , and . CISR, page 9-12. ACM, (2014)An Ideal Fine-Grained GAC Algorithm for Table Constraints., , , , , and . ICSI (1), volume 9712 of Lecture Notes in Computer Science, page 86-94. Springer, (2016)Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network., , and . DSN, page 52-63. IEEE, (2019)Preference Learning with Extreme Examples., , , , , and . IJCAI, page 1285-1290. (2009)