Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications., , , and . EAI Endorsed Trans. Security Safety, 7 (23): e5 (2020)Breaking graph-based IoT malware detection systems using adversarial examples: poster., , , , , , and . WiSec, page 290-291. ACM, (2019)Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments., , , , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 299-312. Springer, (2019)Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks., , and . PST, page 1-10. IEEE Computer Society, (2018)On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study., , , , and . ICTC, page 100-104. IEEE, (2020)AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems., , , , , and . ICDCS, page 1296-1305. IEEE, (2019)Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection., , , , , and . ICICS, volume 12282 of Lecture Notes in Computer Science, page 443-461. Springer, (2020)Proactive detection of algorithmically generated malicious domains., , , and . ICOIN, page 21-24. IEEE, (2018)Investigating DNS Manipulation by Open DNS Resolvers., , and . CoNEXT Companion, page 45-46. ACM, (2019)