Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generative Adversarial Networks for anomaly detection on decentralised data., , , and . Annu. Rev. Control., (2022)Adversarial Decisions on Complex Dynamical Systems using Game Theory., , and . CoRR, (2022)Distributed Generative Adversarial Networks for Anomaly Detection., , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 3-22. Springer, (2020)Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity., , , , and . NeurIPS, (2022)Exploiting Certified Defences to Attack Randomised Smoothing., , , , and . CoRR, (2023)Privacy-Preserving Collaborative SDR Networks for Anomaly Detection., , , , and . ICC, page 1-6. IEEE, (2021)An Adversarial Strategic Game for Machine Learning as a Service using System Features., , , , and . AAMAS, page 2508-2510. ACM, (2023)A novel numerical solver for nonlinear boundary value problems, with applications to the forced Gardner equation.. Monash University, Australia, (2019)Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders., , , and . ICC, page 6343-6348. IEEE, (2023)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , and . Artif. Intell. Rev., 56 (10): 10921-10959 (October 2023)