Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering., , , , and . CoRR, (2023)Automated Feature Engineering for AutoML Using Genetic Algorithms., and . SECRYPT, page 450-459. SCITEPRESS, (2023)Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning., , , and . ICBEA, page 50-57. ACM, (2018)A semantic analysis approach to manage IDS alerts flooding., and . IAS, page 156-161. IEEE, (2011)The Curious Case of Machine Learning in Malware Detection., , and . ICISSP, page 528-535. SciTePress, (2019)Alpaca against Vicuna: Using LLMs to Uncover Memorization of LLMs., , , , , , , and . CoRR, (2024)Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History., , and . FPS, volume 12056 of Lecture Notes in Computer Science, page 387-397. Springer, (2019)Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 51-59. IEEE, (2021)Method ontology for intelligent network forensics analysis., and . PST, page 7-14. IEEE, (2010)Preserving Privacy Through Dememorization: An Unlearning Technique For Mitigating Memorization Risks In Language Models., , and . EMNLP, page 4360-4379. Association for Computational Linguistics, (2023)