Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification., , and . ICRA, page 5255-5261. IEEE, (2020)DeepContext: Mobile Context Modeling and Prediction via HMMs and Deep Learning., , and . IEEE Trans. Mob. Comput., 22 (12): 6874-6888 (December 2023)CloudID: Trustworthy cloud-based and cross-enterprise biometric identification., , and . Expert Syst. Appl., 42 (21): 7905-7916 (2015)CPAC: securing critical infrastructure with cyber-physical access control., , , , and . ACSAC, page 139-152. ACM, (2016)TroGuard: context-aware protection against web-based socially engineered trojans., , , and . ACSAC, page 66-75. ACM, (2014)TMQ: Threat model quantification in Smart Grid critical infrastructures., and . SmartGridComm, page 584-589. IEEE, (2014)Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems., , , , and . ICONIP (5), volume 14451 of Lecture Notes in Computer Science, page 188-201. Springer, (2023)RRE: A game-theoretic intrusion Response and Recovery Engine., , , and . DSN, page 439-448. IEEE Computer Society, (2009)Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords., , , , and . DSN, page 583-594. IEEE Computer Society, (2016)Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems., , , , , , and . IEEE Access, (2021)