Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Training Using Natural Transformation., , , , , and . CoRR, (2021)Cybersecurity Maturity in the Pacific Islands - Informing a Regional CERT Framework., , and . HICSS, page 1-10. ScholarSpace, (2022)Authentication and Access Control in 5G Device-to-Device Communication., , and . TrustCom, page 1575-1582. IEEE, (2021)R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy., , , , and . IJCNN, page 1-9. IEEE, (2022)Latent Space-Based Backdoor Attacks Against Deep Neural Networks., , and . IJCNN, page 1-10. IEEE, (2022)Zertifizierung und modellgetriebene Entwicklung sicherer Software (ZeMoSS 2012)., , and . Software Engineering, volume P-198 of LNI, page 198-200. GI, (2012)CeMoSS - Certification and Model-Driven Development of Safe and Secure Software., , and . Software Engineering, volume P-227 of LNI, page 207-208. GI, (2014)Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems., , and . ISGT Asia, page 1-5. IEEE, (2021)Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia., , , , and . iConference (3), volume 14598 of Lecture Notes in Computer Science, page 295-310. Springer, (2024)Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing., , , , , , , and . CoRR, (2024)