Author of the publication

Deep Learning Based Approach for Classifying Power Signals and Detecting Anomalous Behavior of Wireless Devices.

, , and . SERVICES, page 92-98. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices., , , , and . ISSE, page 1-8. IEEE, (2020)Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis., , , , and . ICIOT, page 82-90. IEEE, (2019)Time Series Forecasting using Facebook Prophet for Cloud Resource Management., , , and . ICC Workshops, page 1-6. IEEE, (2021)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints., , , , , , and . ISSE, page 1-8. IEEE, (2019)Deep Learning Based Approach for Classifying Power Signals and Detecting Anomalous Behavior of Wireless Devices., , and . SERVICES, page 92-98. IEEE, (2019)Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks., , , , and . CCWC, page 191-198. IEEE, (2022)Data Balancing and CNN based Network Intrusion Detection System., , , and . WCNC, page 1-6. IEEE, (2023)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)Analytical Modeling and Prediction of Cloud Workload., , , and . ICC Workshops, page 1-6. IEEE, (2021)