From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach., , и . CSR, стр. 432-439. IEEE, (2023)Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models., , , и . TPS-ISA, стр. 91-100. IEEE, (2023)Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework., , , , и . IJCNN, стр. 1-8. IEEE, (2022)Blockchain-based Smart Supply Chain Management., , и . DSA, стр. 203-208. IEEE, (2022)Adversarial Attacks on Deep Learning-Based UAV Navigation Systems., , , и . CNS, стр. 1-6. IEEE, (2023)A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection., , , , , и . SMC, стр. 1927-1934. IEEE, (2021)EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks., , , и . IEEE Access, (2019)Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings., , , , и . IEEE Syst. J., 15 (3): 4189-4198 (2021)Identifying Information Superspreaders of COVID-19 from Arabic Tweets., , , , , и . MENACOMM, стр. 109-114. IEEE, (2021)Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks., , , , , и . CoRR, (2020)