Author of the publication

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.

, , , , and . VECoS, volume 12519 of Lecture Notes in Computer Science, page 207-221. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Prediction With System-Call Sequence-to-Sequence Model., , , and . IEEE Access, (2018)AppQ: Warm-starting App Recommendation Based on View Graphs., , , , , and . CoRR, (2021)Blockchain-based decentralized federated learning: A secure and privacy-preserving system., , , , , , , , , and . HPCC/DSS/SmartCity/DependSys, page 941-948. IEEE, (2021)Alexa Skills: Security Vulnerabilities and Countermeasures., , , , and . CNS, page 1-9. IEEE, (2022)Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks., , , , , , , and . ISSREW, page 214-221. IEEE, (2023)Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles., , and . BigCom, page 14-21. IEEE, (2021)Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System., , , , and . ICPADS, page 667-672. IEEE, (2020)Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness., , , , and . ICPADS, page 217-225. IEEE, (2022)Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts., , , and . ICC, page 1835-1839. IEEE, (2008)OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines., , , and . Concurr. Comput. Pract. Exp., 27 (5): 1092-1109 (2015)