Author of the publication

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.

, , , , , , and . FRUCT, page 3-14. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security issues in Internet of Vehicles (IoV): A comprehensive survey., , , , , and . Internet Things, (July 2023)CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment., , , , , and . Sensors, 23 (13): 5941 (July 2023)Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study., , , , , , and . FRUCT, page 3-14. IEEE, (2022)Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning., , and . PST, page 1-10. IEEE, (2022)A feature exploration approach for IoT attack type classification., , , , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 582-588. IEEE, (2021)Verification Based Scheme to Restrict IoT Attacks., , , , , and . BDCAT, page 63-68. ACM, (2021)Threshold based Technique to Detect Anomalies using Log Files., , , and . ICMLT, page 191-198. ACM, (2022)Correction to: Two-Factor Blockchain for Traceability Cacao Supply Chain., , and . INCoS, volume 23 of Lecture Notes on Data Engineering and Communications Technologies, Springer, (2018)Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 574-581. IEEE, (2021)The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (3): 3376-3390 (June 2024)