Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity recognition and user preference learning for automated configuration of IoT environments., , , and . IOT, page 3:1-3:8. ACM, (2020)Active Machine Learning Adversarial Attack Detection in the User Feedback Process., , , and . IEEE Access, (2021)Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring., , , , , and . Secur. Priv., (2021)Beyond Random Noise: Insights on Anonymization Strategies from a Latent Bandit Study., , , and . CoRR, (2023)A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles., , , , and . Sensors, 21 (18): 6018 (2021)Digital forensic readiness intelligence crime repository., , , and . Secur. Priv., (2021)Security by Design for Big Data Frameworks Over Cloud Computing., , , , , and . IEEE Trans. Engineering Management, 69 (6): 3676-3693 (2022)Handling Non-IID Data in Federated Learning: An Experimental Evaluation Towards Unified Metrics., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 762-770. IEEE, (2023)Scalable federated machine learning with FEDn., , , , , , , and . CCGRID, page 555-564. IEEE, (2022)An extensive experimental survey of regression methods., , , , , and . Neural Networks, (2019)