Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , and . ARES, page 20:1-20:10. ACM, (2021)An effective unsupervised network anomaly detection method., , and . ICACCI, page 533-539. ACM, (2012)Unsupervised root-cause identification of software bugs in 5G RAN., , and . CCNC, page 624-630. IEEE, (2022)Anomaly Detection and Resolution on the Edge: Solutions and Future Directions., , and . SOSE, page 227-238. IEEE, (2023)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation., , , and . ICDCN, page 372-377. ACM, (2023)Few-Shot Anomaly Detection in Text with Deviation Learning., , , and . ICONIP (2), volume 14448 of Lecture Notes in Computer Science, page 425-438. Springer, (2023)Adversarial Impact on Anomaly Detection in Cloud Datacenters., , , and . PRDC, page 188-197. IEEE, (2019)SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling., , , and . CIKM, page 3078-3082. ACM, (2021)Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 266-280. Springer, (2023)