Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of network trust using provenance based on distributed local intelligence., , , , , , and . MILCOM, page 1493-1498. IEEE, (2011)Adaptive Situational Leadership Framework., , and . CogSIMA, page 63-69. IEEE, (2018)Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth., , , and . MILCOM, page 450-455. IEEE, (2018)A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning., , , , , , , , , and . Inf. Fusion, (January 2024)Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation., , , , and . CoRR, (2023)Text Mining-based Social-Psychological Vulnerability Analysis of Potential Victims To Cybergrooming: Insights and Lessons Learned., , , and . WWW (Companion Volume), page 1381-1388. ACM, (2023)Dynamics of Uncertain Opinions in Social Networks., and . MILCOM, page 1627-1632. IEEE, (2014)Authentic Dialogue Generation to Improve Youth's Awareness of Cybergrooming for Online Safety., , , and . ICTAI, page 64-69. IEEE, (2023)ScanFed: Scalable Behavior-Based Backdoor Detection in Federated Learning., , , , , , , and . ICDCS, page 782-793. IEEE, (2023)Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory., , , , , and . GLOBECOM, page 3393-3398. IEEE, (2022)