Author of the publication

Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks.

, , , and . ICMLA, page 1115-1120. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SynchroSim: An Integrated Co-simulation Middleware for Heterogeneous Multi-robot System., , , and . DCOSS, page 334-341. IEEE, (2022)Reinforcement Learning with An Abrupt Model Change., , , and . WSC, page 3014-3025. IEEE, (2023)Benchmarking Deep Learning Classifiers for SAR Automatic Target Recognition., , , , and . HPEC, page 1-6. IEEE, (2023)Flood-ResNet50: Optimized Deep Learning Model for Efficient Flood Detection on Edge Device., , , , , , , , and . ICMLA, page 512-519. IEEE, (2023)Performance of Graph Neural Networks for Point Cloud Applications., , , , and . HPEC, page 1-7. IEEE, (2023)Uncertainty-Aware SAR ATR: Defending Against Adversarial Attacks via Bayesian Neural Networks., , , and . CoRR, (2024)Reproducible and Portable Big Data Analytics in the Cloud., , , , , , and . IEEE Trans. Cloud Comput., 11 (3): 2966-2982 (July 2023)An edge-cloud integrated framework for flexible and dynamic stream analytics., , , , , and . Future Gener. Comput. Syst., (2022)Distributed event-triggered unadjusted Langevin algorithm for Bayesian learning., , , and . Autom., (October 2023)Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks., , , and . ICMLA, page 1115-1120. IEEE, (2022)