Author of the publication

UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off.

, , , , , , and . IEEE Trans. Veh. Technol., 73 (5): 6993-7006 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transmission delay in large scale ad hoc cognitive radio networks., , , and . MobiHoc, page 185-194. ACM, (2012)K-connectivity of cognitive radio networks., , , and . ICC, page 83-87. IEEE, (2012)Efficient Clustering on Encrypted Data., , , , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 213-236. Springer, (2024)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection., , , , and . MASS, page 308-316. IEEE Computer Society, (2018)NetSentry: Scalable Volumetric DDoS Detection with Programmable Switches., , , , , and . IWQoS, page 1-10. IEEE, (2024)Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective., , and . CoRR, (2019)An Automated Multi-Tab Website Fingerprinting Attack., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3656-3670 (2022)Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System., , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic., , , , , , , , and . NDSS, The Internet Society, (2024)