Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending active learning against adversarial inputs in automated document classification., , , and . GlobalSIP, page 257-261. IEEE, (2016)When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions., , , , , , and . CoRR, (2020)Risk assessment based access control with text and behavior analysis for document management., and . MILCOM, page 37-42. IEEE, (2016)Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective., and . IEEE/ACM Trans. Netw., 25 (1): 43-55 (2017)Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error., , , and . CSSP, 29 (2): 275-293 (2010)On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid., , and . IEEE Syst. J., 12 (4): 3404-3413 (2018)Cyber Deception: Overview and the Road Ahead., and . IEEE Secur. Priv., 16 (2): 80-85 (2018)Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation., , and . IEEE Trans. Mob. Comput., 18 (1): 111-124 (2019)Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation., , , and . IEEE/ACM Trans. Netw., 29 (6): 2779-2792 (2021)Steel Surface Defect Detection via Deformable Convolution and Background Suppression., , , , and . IEEE Trans. Instrum. Meas., (2023)