Author of the publication

Intelligent Fingerprinting to Detect Data Leakage Attacks on Spectrum Sensors.

, , , , and . ICC, page 4080-4085. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent and behavioral-based detection of malware in IoT spectrum sensors., , , , , and . Int. J. Inf. Sec., 22 (3): 541-561 (June 2023)LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers., , , , , and . Internet Things, (July 2023)FederatedTrust: A Solution for Trustworthy Federated Learning., , , , , and . CoRR, (2023)Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors., , , , , , and . NOMS, page 1-7. IEEE, (2022)Assessing the Sustainability and Trustworthiness of Federated Learning Models., , , , , and . CoRR, (2023)Fedstellar: A Platform for Training Models in a Privacy-preserving and Decentralized Fashion., , , , , , and . IJCAI, page 7154-7157. ijcai.org, (2023)RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning., , , , , , , , and . CNSM, page 364-366. IEEE, (2022)BEHACOM., , , , , , , , , and 3 other author(s). (April 2020)Decentralized Federated Learning: Fundamentals, State of the Art, Frameworks, Trends, and Challenges., , , , , , , and . IEEE Commun. Surv. Tutorials, 25 (4): 2983-3013 (Fourthquarter 2023)Can Evil IoT Twins Be Identified? Now Yes, a Hardware Behavioral Fingerprinting Methodology., , , , , and . CoRR, (2021)