Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AITIA: Embedded AI Techniques for Industrial Applications., , , , , , , , , and 3 other author(s). FPL, page 374-375. IEEE, (2021)Analysis of Collision Detection Using Implicit Sphere Tree in Saptic Interaction Environments for Maxillofacial Surgery Applications., , , , and . CISP-BMEI, page 1-6. IEEE, (2018)Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA., , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 133-150. Springer, (2021)SoK - Network Intrusion Detection on FPGA., , , , , and . SPACE, volume 13162 of Lecture Notes in Computer Science, page 242-261. Springer, (2021)AITIA: Embedded AI Techniques for Embedded Industrial Applications., , , , , , , , , and 3 other author(s). COINS, page 1-7. IEEE, (2020)Feature dimensionality in CNN acceleration for high-throughput network intrusion detection., , and . FPL, page 366-374. IEEE, (2022)Quantization-aware Neural Architectural Search for Intrusion Detection., , , , and . CoRR, (2023)Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT., , , , and . ACNS Workshops (1), volume 14586 of Lecture Notes in Computer Science, page 246-264. Springer, (2024)