Author of the publication

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.

, , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-task Learning based Voice Verification with Triplet Loss., , and . MAPR, page 1-6. IEEE, (2020)Predictive cruise control behind a stationary or slow moving object., , , , , , and . IV, page 2099-2105. IEEE, (2019)Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception., , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)Traffic Incident Recognition Using Empirical Deep Convolutional Neural Networks Model., and . ICCASA/ICTCC, volume 217 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 90-99. Springer, (2017)A software framework for probabilistic sensitivity analysis for computationally expensive models., , , , and . Adv. Eng. Softw., (2016)A Stochastic Target Approach for P&L Matching Problems., and . Math. Oper. Res., 37 (3): 526-558 (2012)A Novel Dual Full-Bridge LLC Resonant Converter for CC and CV Charges of Batteries for Electric Vehicles., and . IEEE Trans. Ind. Electron., 65 (3): 2212-2225 (2018)Domain-specific NLP system to support learning path and curriculum design at tech universities., , , , , and . Comput. Educ. Artif. Intell., (2022)Localization Using Low-Resolution Optical Sensors., , , , and . MASS, page 1-9. IEEE Computer Society, (2007)Extraction of Text Regions from Complex Background in Document Images by Multilevel Clustering., , , and . Int. J. Networked Distributed Comput., 4 (1): 11-21 (2016)