Author of the publication

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis.

, , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things., , , , , and . J. Parallel Distributed Comput., (2022)EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles., , , and . J. Inf. Secur. Appl., (2021)2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT., , , , , and . Comput. Secur., (April 2023)Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications: Centralized and Federated Learning., , , , and . (April 2022)Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions., , , and . IEEE CAA J. Autom. Sinica, 9 (3): 407-436 (2022)Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies., , , , and . IEEE CAA J. Autom. Sinica, 8 (4): 718-752 (2021)Digital Agriculture Security: Aspects, Threats, Mitigation Strategies, and Future Trends., , , and . IEEE Internet Things Mag., 5 (3): 82-90 (2022)Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning., , , , and . IEEE Access, (2022)Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis., , , , and . IEEE Access, (2021)Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses., , , , , , , , and . CoRR, (2023)