Author of the publication

Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques.

, , , , and . IEEE Secur. Priv., 20 (4): 51-60 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big uncertain data of multiple sensors efficient processing with high order multi-hypothesis: an evidence theoretic approach., , , , and . Int. J. Big Data Intell., 5 (3): 177-190 (2018)Detecting Malicious False Frame Injection Attacks on Surveillance Systems at the Edge Using Electrical Network Frequency Signals., , , , and . Sensors, 19 (11): 2424 (2019)A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks., , , , and . IEEE Trans. Smart Grid, 14 (2): 1188-1197 (March 2023)Efficient Computing of Dempster-Shafer Theoretic Conditionals for Big Hard/Soft Data Fusion., , , , and . FUSION, page 643-650. IEEE, (2018)Processing Approximate Moving Range Queries in Mobile Sensor Environments., , and . CSE (2), page 452-457. IEEE Computer Society, (2009)A Mobile Computing Approach to Automatic Traffic Evacuation Management., , , , and . ITSC, page 85-90. IEEE, (2006)FogSurv: A Fog-Assisted Architecture for Urban Surveillance Using Artificial Intelligence and Data Fusion., , , , , , and . IEEE Access, (2021)Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach., , , , and . Future Internet, 14 (5): 125 (2022)Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain., , , , , and . ISC2, page 1-8. IEEE, (2018)Real-Time Query Processing on Live Videos in Networks of Distributed Cameras., , and . Int. J. Interdiscip. Telecommun. Netw., 2 (1): 27-48 (2010)