Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Impact of Malicious and Cooperative Clients on Validation Score-Based Model Aggregation for Federated Learning., , and . ICC, page 1634-1639. IEEE, (2023)Collaborative Self Organizing Map with DeepNNs for Fake Task Prevention in Mobile Crowdsensing., , and . ICC, page 4794-4799. IEEE, (2022)Optical inter-data-center network design under resilience requirements and dynamic electricity pricing., and . ICTON, page 1-4. IEEE, (2014)On the Impact of Data Integrity Attacks on Vehicle-to-Microgrid Services., and . CAMAD, page 1-7. IEEE, (2021)Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset., , and . WiseML@WiSec, page 25-30. ACM, (2020)Resiliency versus energy sustainability in optical inter-datacenter networks., , and . Opt. Switch. Netw., (2017)Deep Learning for Recognizing the Anatomy of Tables on Datasheets., , , and . ISCC, page 1-6. IEEE, (2019)Deep Learning for the Detection of Tabular Information from Electronic Component Datasheets., , , and . ISCC, page 1-6. IEEE, (2019)Periodic GATE Optimization with QoS-awareness for Long-Reach Passive Optical Networks., and . ISCC, page 879-884. IEEE Computer Society, (2010)Delay tolerant EPC-BGP for discovery services in EPCGlobal networks., , and . ISCC, page 1-5. IEEE Computer Society, (2014)