Author of the publication

Overcoming Stealthy Adversarial Attacks on Power Grid Load Predictions Through Dynamic Data Repair.

, , , , and . DDDAS, volume 12312 of Lecture Notes in Computer Science, page 102-109. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying DDDAS Principles for Realizing Optimized and Robust Deep Learning Models at the Edge., , , , and . DDDAS, volume 13984 of Lecture Notes in Computer Science, page 325-339. Springer, (2022)Cost-effective Hardware Accelerator Recommendation for Edge Computing., , , and . HotEdge, USENIX Association, (2020)Overcoming Stealthy Adversarial Attacks on Power Grid Load Predictions Through Dynamic Data Repair., , , , and . DDDAS, volume 12312 of Lecture Notes in Computer Science, page 102-109. Springer, (2020)Guarding Against Universal Adversarial Perturbations in Data-driven Cloud/Edge Services., , , , , , and . IC2E, page 233-244. IEEE, (2022)Dynamic resource management algorithms for edge computing using hardware accelerators.. Middleware Doctoral Symposium, page 41-43. ACM, (2019)Adversarially Robust Edge-Based Object Detection for Assuredly Autonomous Systems., , , , and . ICAA, page 97-106. IEEE, (2022)Reinforcement Learning-based Performance-aware Energy Management in 5G Base Stations., , , , and . COMSNETS, page 568-571. IEEE, (2024)Tools and Techniques for Privacy-aware, Edge-centric Distributed Deep Learning., , , , and . DIDL@Middleware, page 7-12. ACM, (2020)