Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication., , , , and . IEEE J. Sel. Areas Commun., 37 (6): 1402-1412 (2019)DAWN: Dynamic Adversarial Watermarking of Neural Networks., , , and . CoRR, (2019)Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses., , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 384-404. Springer, (2022)PrivICN: Privacy-preserving content retrieval in information-centric networking., , , and . Comput. Networks, (2019)Access Control for Implantable Medical Devices., , , and . IEEE Trans. Emerg. Top. Comput., 9 (3): 1126-1138 (2021)DAWN: Dynamic Adversarial Watermarking of Neural Networks., , , and . ACM Multimedia, page 4417-4425. ACM, (2021)Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications., , , , and . CCNC, page 956-962. IEEE, (2024)Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices., , , and . IoTDI, page 15-27. ACM, (2021)Detecting organized eCommerce fraud using scalable categorical clustering., and . ACSAC, page 215-228. ACM, (2019)A Survey on XAI for Beyond 5G Security: Technical Aspects, Use Cases, Challenges and Research Directions., , , , , , and . CoRR, (2022)