From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Deep Transfer Learning Approach for Flow-Based Intrusion Detection in SDN-Enabled Network., , , , , , и . SoMeT, том 337 из Frontiers in Artificial Intelligence and Applications, стр. 327-339. IOS Press, (2021)MalDEX: An Explainable Malware Detection System Based on Ensemble Learning., , , и . MAPR, стр. 1-6. IEEE, (2023)On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors., , , , , и . MAPR, стр. 1-6. IEEE, (2023)A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System., , , и . NSS, том 13041 из Lecture Notes in Computer Science, стр. 353-368. Springer, (2021)Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense., , , и . NSS, том 13041 из Lecture Notes in Computer Science, стр. 131-147. Springer, (2021)XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph., , , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 546-561. Springer, (2023)Federated Learning-Based Cyber Threat Hunting for APT Attack Detection in SDN-Enabled Networks., , , и . ISCIT, стр. 1-6. IEEE, (2022)Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis., , и . ICISA, том 424 из Lecture Notes in Electrical Engineering, стр. 298-305. Springer, (2017)A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation., , , и . SoICT, стр. 200-207. ACM, (2018)A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation., , , , , и . SoICT, стр. 142-149. ACM, (2022)