Author of the publication

PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring.

, , , and . AICCSA, page 1-8. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks.. ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)Cypider: building community-based cyber-defense infrastructure for android malware detection., , , and . ACSAC, page 348-362. ACM, (2016)Trust models of internet of smart things: A survey, open issues, and future directions., , , and . J. Netw. Comput. Appl., (2019)Semi-structured and unstructured data aggregation scheduling in wireless sensor networks., , , , and . INFOCOM, page 2671-2675. IEEE, (2012)A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media., , , , , and . IEEE Access, (2022)On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications., , , , , , and . HealthCom, page 205-210. IEEE, (2015)Keynote Speaker 6: Intrusion detection systems using machine learning for the security of autonomous vehicles.. SIN, page 1. IEEE, (2022)Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges., , and . WETICE, page 208-213. IEEE, (2019)Ad Hoc Networks Routing Protocols and Mobility., , and . Int. Arab J. Inf. Technol., 3 (2): 126-133 (2006)Distributed Low-Latency Data Aggregation Scheduling in Wireless Sensor Networks., , , , and . ACM Trans. Sens. Networks, 11 (3): 49:1-49:36 (2015)