Author of the publication

Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models.

, , , , and . IFIP Networking, page 1-9. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models., , , , and . IFIP Networking, page 1-9. IEEE, (2022)Distributed Training for Deep Learning Models On An Edge Computing Network Using Shielded Reinforcement Learning., and . ICDCS, page 581-591. IEEE, (2022)Efficient Black-Box Adversarial Attacks for Deep Driving Maneuver Classification Models., , , and . MASS, page 536-544. IEEE, (2021)A Context-aware Black-box Adversarial Attack for Deep Driving Maneuver Classification Models., , and . SECON, page 1-9. IEEE, (2021)AntiqueData: A Proxy to Maintain Computational Transparency in Cloud., , , and . DASFAA Workshops, volume 8505 of Lecture Notes in Computer Science, page 256-267. Springer, (2014)A Real-Time Crowd-Powered Testbed for Content Assessment of Potential Social Media Posts., , , , , and . SocInfo, volume 9471 of Lecture Notes in Computer Science, page 136-152. Springer, (2015)NoiseSenseDNN: Modeling DNN for Sensor Data to Mitigate the Effect of Noise in Edge Devices., , and . MASS, page 374-382. IEEE, (2020)A Diverse Noise-Resilient DNN Ensemble Model on Edge Devices for Time-Series Data., , , and . SECON, page 1-9. IEEE, (2021)Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes., , , and . ICPP, page 67:1-67:11. ACM, (2020)An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks., , , and . SC Companion, page 1106-1115. IEEE Computer Society, (2012)