Author of the publication

Using hierarchical statistical analysis and deep neural networks to detect covert timing channels.

, , , , and . Appl. Soft Comput., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Adversarial Machine Learning Conundrum: Can The Insecurity of ML Become The Achilles' Heel of Cognitive Networks?, , , and . CoRR, (2019)Towards a client-side QoS monitoring and assessment using Generalized Pareto Distribution in a cloud-based environment., , , and . WCNC Workshops, page 123-128. IEEE, (2013)Constructing an Efficient Mobility Profile of Ad-Hoc Node for Mobility-Pattern-Based Anomaly Detection in MANET., , , and . GLOBECOM, IEEE, (2006)Deriving Emotions and Sentiments from Visual Content: A Disaster Analysis Use Case., , , and . CoRR, (2020)Fine-Grained Data Selection for Improved Energy Efficiency of Federated Edge Learning., , , and . IEEE Trans. Netw. Sci. Eng., 9 (5): 3258-3271 (2022)A Novel Technique for Detecting Underground Water Pipeline Leakage Using the Internet of Things., , and . J. Univers. Comput. Sci., 29 (8): 838-865 (August 2023)RSU Cloud and its Resource Management in support of Enhanced Vehicular Applications., , , and . CoRR, (2017)A systematic review of federated learning incentive mechanisms and associated security challenges., , , , , and . Comput. Sci. Rev., (November 2023)Reinforcement learning for resource provisioning in the vehicular cloud., , and . IEEE Wirel. Commun., 23 (4): 128-135 (2016)The Duo of Artificial Intelligence and Big Data for Industry 4.0: Review of Applications, Techniques, Challenges, and Future Research Directions., , , , and . CoRR, (2021)