Author of the publication

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.

, , , , and . VECoS, volume 12519 of Lecture Notes in Computer Science, page 207-221. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perfusion study on Modic changes of spine based on DCE-MRI., , , , , , and . BHI, page 365-367. IEEE, (2012)Automatic Reward Design via Learning Motivation-Consistent Intrinsic Rewards., , , and . CoRR, (2022)Availability-Aware Survivable Virtual Network Embedding in Optical Datacenter Networks., , , and . JOCN, 7 (12): 1160-1171 (2015)Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning., , , and . ISCC, page 1-6. IEEE, (2022)A Novel Electrode Design in DETF with Reducing Multimode Effect., , , , and . NEMS, page 1-5. IEEE, (2018)Control and Management of Optical Inter-Satellite Network based on CCSDS Protocol (Invited)., , , , , , , , , and . ECOC, page 1-3. IEEE, (2020)Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping., , , , , , , and . NeurIPS, (2020)Individual tree detection and segmentation from unmanned aerial vehicle-LiDAR data based on a trunk point distribution indicator., , , , and . Comput. Electron. Agric., (2024)Transformable Inspection Robot Design and Implementation for Complex Pipeline Environment., , , , , , , , and . IEEE Robotics Autom. Lett., 9 (6): 5815-5822 (June 2024)Assessing transferability of adversarial examples against malware detection classifiers., , and . CF, page 211-214. ACM, (2019)