Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Learning Schemes for Metaverse Applications in B5G/6G Networks., , , and . MetaCom, page 799-804. IEEE, (2023)Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks., , , , , , and . CCNC, page 333-338. IEEE, (2024)Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks., , , , , and . IEEE Access, (2023)Novel Evasion Attacks Against Adversarial Training Defense for Smart Grid Federated Learning., , , , , and . IEEE Access, (2023)Privacy-Preserving and Efficient Data Collection Scheme for AMI Networks Using Deep Learning., , , , , and . CoRR, (2020)A Circuit-embedded Reservoir Computer for Smart Noise Reduction of MCG Signals., , , and . IoTaIS, page 56-61. IEEE, (2021)A Systematic Comparison of Traditional and Hybrid AI Models for NHANES Big Data Analytics., , , and . IoTaIS, page 92-97. IEEE, (2021)Machine Learning Benchmarking for Secured IoT Smart Systems., , , and . IoTaIS, page 50-56. IEEE, (2022)An Explainable AI Model for Interpretable Lung Disease Classification., , and . IoTaIS, page 98-103. IEEE, (2021)On Enhancing WiGig Communications With A UAV-Mounted RIS System: A Contextual Multi-Armed Bandit Approach., , , , , and . PIMRC, page 1-7. IEEE, (2023)