Author of the publication

Impact of social influence on trust management within communities of agents.

, , , and . Web Intell., 15 (3): 251-268 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Data Processing for Industrial Remote Diagnosis and Maintenance., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 335-346. Springer, (2020)Deep Reinforcement Learning-Based Defense Strategy Selection., , , and . ARES, page 110:1-110:11. ACM, (2022)Secure and Robust Cyber Security Threat Information Sharing., , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 3-18. Springer, (2021)H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption., , , , and . ITSC, page 4086-4093. IEEE, (2023)Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks., , , , , and . ARES, page 31:1-31:6. ACM, (2022)Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey., , , , , , , and . CoRR, (2024)Exploring the Quantitative Resilience Analysis of Cyber-Physical Systems., , , , and . IFIP Networking, page 1-6. IEEE, (2023)Diffusion-based Adversarial Purification for Intrusion Detection., , , , and . CoRR, (2024)A Deeper Analysis of Adversarial Examples in Intrusion Detection., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 67-84. Springer, (2020)Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack Approach., , , , and . CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS, volume 13785 of Lecture Notes in Computer Science, page 212-227. Springer, (2022)