From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems., , , , и . ANT/EDI40, том 184 из Procedia Computer Science, стр. 573-580. Elsevier, (2021)Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System., , , , и . iSCI, том 1122 из Communications in Computer and Information Science, стр. 73-85. Springer, (2019)SUSAN: A Deep Learning based anomaly detection framework for sustainable industry., , , и . Sustain. Comput. Informatics Syst., (января 2023)GeoBot: A High Level Visual Perception Architecture for Autonomous Robots., , и . ICVS, стр. 19. IEEE Computer Society, (2006)On the performance of a deep learning-based anomaly detection system for 5G networks., , , и . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, стр. 1-8. IEEE, (2017)Authcode - Dataset., , , и . (апреля 2020)AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning., , , и . Comput. Secur., (2021)Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments., , , , , и . Sensors, 19 (5): 1114 (2019)AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning., , , и . CoRR, (2020)On Deadlock Frequency during Dynamic Reconfiguration in NOWs., , и . Euro-Par, том 2150 из Lecture Notes in Computer Science, стр. 630-638. Springer, (2001)