Author of the publication

FBA-SDN: A Federated Byzantine Approach for Blockchain-Based Collaborative Intrusion Detection in Edge SDN.

, , , , and . ICC Workshops, page 427-433. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Replicator Dynamics Approach to Collective Feature Engineering in Random Forests., , and . SGAI Conf., page 25-41. Springer, (2015)Mobile Activity Recognition Using Ubiquitous Data Stream Mining., , , , and . DaWaK, volume 7448 of Lecture Notes in Computer Science, page 130-141. Springer, (2012)Towards an Adaptive Approach for Mining Data Streams in Resource Constrained Environments., , and . DaWaK, volume 3181 of Lecture Notes in Computer Science, page 189-198. Springer, (2004)OntoPeFeGe: Ontology-Based Personalized Feedback Generator., , and . IEEE Access, (2018)Deep reward shaping from demonstrations., , , and . IJCNN, page 510-517. IEEE, (2017)Adaptive One-Class Ensemble-based Anomaly Detection: An Application to Insider Threats., and . IJCNN, page 1-9. IEEE, (2018)Resource-aware Online Data Mining in Wireless Sensor Networks., , and . CIDM, page 139-146. IEEE, (2007)Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks., , and . ADC, volume 75 of CRPIT, page 95-102. Australian Computer Society, (2008)An Information-Theoretic Approach for Setting the Optimal Number of Decision Trees in Random Forests., , and . SMC, page 1013-1019. IEEE, (2013)4S-DT: Self Supervised Super Sample Decomposition for Transfer learning with application to COVID-19 detection., , and . CoRR, (2020)