Author of the publication

Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update.

, , , and . IEEE Internet Things J., 11 (6): 9382-9391 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REDEM: Real-Time Detection and Mitigation of Communication Attacks in Connected Autonomous Vehicle Applications., and . IFIPIoT, volume 574 of IFIP Advances in Information and Communication Technology, page 105-122. Springer, (2019)Equivalence checking for function pipelining in behavioral synthesis., , and . DATE, page 1-6. European Design and Automation Association, (2014)Security challenges in mobile and IoT systems., and . SoCC, page 356-361. IEEE, (2016)Safety, Security, and Reliability: The Automotive Robustness Problem and an Architectural Solution.. ICCE, page 1-4. IEEE, (2019)Poster: Efficient Exploration of Automotive Ranging Sensor Attacks., , , and . MobiHoc, page 589-591. ACM, (2023)VIVE: Virtualization of Vehicular Electronics for System-level Exploration., , and . ITSC, page 3307-3312. IEEE, (2021)Deep-Learning-Based Intrusion Detection for Autonomous Vehicle-Following Systems., , , , , , , and . ITSC, page 865-872. IEEE, (2021)Transaction Flows and Executable Models: Formalization and Analysis of Message passing Protocols., , and . FMCAD, page 168-175. IEEE, (2015)Do VIR: Virtualizing Food Donation Distribution through Mobile Application and Cloud-Based Supply Chain Management., , and . ICCE, page 1-5. IEEE, (2021)Preface., and . FMCAD, IEEE, (2013)