Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses., , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 384-404. Springer, (2022)AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication., , , , and . IEEE J. Sel. Areas Commun., 37 (6): 1402-1412 (2019)Real-time Attacks Against Deep Reinforcement Learning Policies., , , and . CoRR, (2021)DÏoT: A Federated Self-learning Anomaly Detection System for IoT., , , , , and . ICDCS, page 756-767. IEEE, (2019)PRADA: Protecting Against DNN Model Stealing Attacks., , , and . EuroS&P, page 512-527. IEEE, (2019)Towards Accountable and Resilient AI-Assisted Networks: Case Studies and Future Challenges., , , , , , and . EuCNC/6G Summit, page 818-823. IEEE, (2024)A systematic review of artificial intelligence impact assessments., , , , , , , , , and 2 other author(s). Artif. Intell. Rev., 56 (11): 12799-12831 (November 2023)Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices., , , and . IoTDI, page 15-27. ACM, (2021)Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications., , , , and . CCNC, page 956-962. IEEE, (2024)Detecting organized eCommerce fraud using scalable categorical clustering., and . ACSAC, page 215-228. ACM, (2019)
OSZAR »