Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Reinforcement Learning for Network Selection Over Heterogeneous Health Systems., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (1): 258-270 (2022)A Comprehensive Survey On Client Selections in Federated Learning., , and . CoRR, (2023)Cooperative Machine Learning Techniques for Cloud Intrusion Detection., , , , , and . IWCMC, page 837-842. IEEE, (2021)Exploiting Traffic Correlation Towards Energy Saving in Data Centers., , , , and . PIMRC, page 1-7. IEEE, (2018)Data Augmentation for Intrusion Detection and Classification in Cloud Networks., , , , and . IWCMC, page 831-836. IEEE, (2021)Iterative Per Group Feature Selection For Intrusion Detection., , , , , , and . IWCMC, page 708-713. IEEE, (2020)Weighted Trustworthiness for ML Based Attacks Classification., , , , , , and . WCNC, page 1-7. IEEE, (2020)Secure Medical Data Sharing For Healthcare System., , and . PIMRC, page 641-647. IEEE, (2022)Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory., , and . IWCMC, page 1101-1106. IEEE, (2023)Hybrid Machine Learning for Network Anomaly Intrusion Detection., , , , and . ICIoT, page 163-170. IEEE, (2020)