From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System., , , , и . iSCI, том 1122 из Communications in Computer and Information Science, стр. 73-85. Springer, (2019)A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices., , , , , , и . ICC, стр. 6010-6015. IEEE, (2023)Study of P300 Detection Performance by Different P300 Speller Approaches Using Electroencephalography., , , , , и . ISMICT, стр. 1-6. IEEE, (2022)SUSAN: A Deep Learning based anomaly detection framework for sustainable industry., , , и . Sustain. Comput. Informatics Syst., (января 2023)Sentinel: An Aggregation Function to Secure Decentralized Federated Learning., , , , , и . CoRR, (2023)Privacy-Preserving and Syscall-Based Intrusion Detection System for IoT Spectrum Sensors Affected by Data Falsification Attacks., , , , , и . IEEE Internet Things J., 10 (10): 8408-8415 (мая 2023)Federated learning for malware detection in IoT devices., , , и . Comput. Networks, (2022)Authcode - Dataset., , , и . (апреля 2020)Voyager: MTD-Based Aggregation Protocol for Mitigating Poisoning Attacks on DFL., , , , и . CoRR, (2023)Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems., , , , и . ANT/EDI40, том 184 из Procedia Computer Science, стр. 573-580. Elsevier, (2021)