Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A deep learning approach for proactive multi-cloud cooperative intrusion detection system., , , and . Future Gener. Comput. Syst., (2019)Malware classification and composition analysis: A survey of recent developments., , and . J. Inf. Secur. Appl., (2021)Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game., , and . ICNC, page 370-374. IEEE, (2019)Deep learning-enabled anomaly detection for IoT systems., , , , , and . Internet Things, (April 2023)Teens-Online: a Game Theory-Based Collaborative Platform for Privacy Education., , and . Int. J. Artif. Intell. Educ., 31 (4): 726-768 (2021)Bi-discriminator GAN for tabular data synthesis., , , , , and . Pattern Recognit. Lett., (2022)On trustworthy federated clouds: A coalitional game approach., , and . Comput. Networks, (2018)A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment., , and . CSCloud/EdgeCom, page 83-88. IEEE Computer Society, (2018)Bi-Discriminator Class-Conditional Tabular GAN., , , , , and . CoRR, (2021)Generative Adversarial Networks for Mitigating Biases in Machine Learning Systems., , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 937-944. IOS Press, (2020)