Author of the publication

An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification.

, , , , , and . CollaborateCom (2), volume 461 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 214-230. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XGBoost-Based Android Malware Detection., , and . CIS, page 268-272. IEEE Computer Society, (2017)Pontus: A Linguistics-Based DGA Detection System., , , , , and . GLOBECOM, page 1-6. IEEE, (2019)Syntax-Aware Transformer for Sentence Classification., , , , , , , and . CCIR, volume 13819 of Lecture Notes in Computer Science, page 40-50. Springer, (2022)Diff-LfD: Contact-aware Model-based Learning from Visual Demonstration for Robotic Manipulation via Differentiable Physics-based Simulation and Rendering., , , , , , , , , and 2 other author(s). CoRL, volume 229 of Proceedings of Machine Learning Research, page 499-512. PMLR, (2023)An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification., , , , , and . CollaborateCom (2), volume 461 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 214-230. Springer, (2022)Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor., , , , and . ICME, page 1211-1216. IEEE, (2023)Learning Reward for Physical Skills using Large Language Model., and . CoRR, (2023)A Comprehensive Measurement Study of Domain-Squatting Abuse., , , , and . ICC, page 1-6. IEEE, (2019)ClothesNet: An Information-Rich 3D Garment Model Repository with Simulated Clothes Environment., , , , , , , , , and 3 other author(s). ICCV, page 20371-20381. IEEE, (2023)Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names., , , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 93-107. Springer, (2021)