Author of the publication

An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks.

, , , , , and . IEEE Trans. Computers, 73 (3): 645-655 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion., , and . INFOCOM Workshops, page 1051-1052. IEEE, (2019)A Dynamic Scalable Blockchain Based Communication Architecture for IoT., , , , and . SmartBlock, volume 11373 of Lecture Notes in Computer Science, page 159-166. Springer, (2018)Re-Think Monitoring Services for 5G Network: Challenges and Perspectives., , , , , and . CSCloud/EdgeCom, page 34-39. IEEE, (2019)DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario., , , and . SmartCom, volume 11910 of Lecture Notes in Computer Science, page 266-276. Springer, (2019)ChainIDE: A Cloud-Based Integrated Development Environment for Cross-Blockchain Smart Contracts., , , , and . CloudCom, page 317-319. IEEE, (2019)A Unified Hardware-based Threat Detector for AI Accelerators., , and . CoRR, (2023)Improved DC Estimation for JPEG Compression Via Convex Relaxation., , , , , and . ICIP, page 2461-2465. IEEE, (2022)Selective encryption on ECG data in body sensor network based on supervised machine learning., , and . Inf. Fusion, (2020)A Networking Perspective on Starlink's Self-Driving LEO Mega-Constellation., , , , , , , , , and 1 other author(s). MobiCom, page 17:1-17:16. ACM, (2023)Review on Image Processing Based Adversarial Example Defenses in Computer Vision., and . BigDataSecurity/HPSC/IDS, page 94-99. IEEE, (2020)