Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable and Sustainable Web of Buildings Architecture. (Architecture Évolutive et Efficiente du Web des Bâtiments).. Télécom ParisTech, France, (2015)Early Detection of Cryptojacker Malicious Behaviors on IoT Crowdsensing Devices., , , , , , and . NOMS, page 1-8. IEEE, (2023)RansomAI: AI-Powered Ransomware for Stealthy Encryption., , , , , , and . GLOBECOM, page 2578-2583. IEEE, (2023)Maximum Likelihood Distillation for Robust Modulation Classification., , and . ICASSP, page 1-5. IEEE, (2023)SafeAMC: Adversarial training for robust modulation classification models., , and . EUSIPCO, page 1636-1640. IEEE, (2022)Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL., , , , and . NOMS, page 1-9. IEEE, (2024)Offering web-of-things connectivity to building networks., and . UbiComp (Adjunct Publication), page 1555-1564. ACM, (2013)SafeAMC: Adversarial training for robust modulation recognition models., , and . CoRR, (2021)Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL., , , , and . CoRR, (2023)Intelligent Fingerprinting to Detect Data Leakage Attacks on Spectrum Sensors., , , , and . ICC, page 4080-4085. IEEE, (2022)