Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber situation perception for Internet of Things systems based on zero-day attack activities recognition within advanced persistent threat., , , and . Concurr. Comput. Pract. Exp., (2022)Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model., , , , and . IEEE Access, (2024)A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing., , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 345-358. Springer, (2019)Xformer: Hybrid X-Shaped Transformer for Image Denoising., , , , , and . CoRR, (2023)Accurate Image Restoration with Attention Retractable Transformer., , , , , and . CoRR, (2022)Hyprogan: Breaking the Dimensional wall From Human to Anime., , , , and . ICIP, page 2066-2070. IEEE, (2022)ADFL: Defending backdoor attacks in federated learning via adversarial distillation., , , , and . Comput. Secur., (September 2023)An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing., , , and . MLICOM, volume 294 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 538-550. Springer, (2019)Edge-based Protection Against Malicious Poisoning for Distributed Federated Learning., , , and . CSCWD, page 459-464. IEEE, (2022)Defending against Membership Inference Attacks in Federated learning via Adversarial Example., , , and . MSN, page 153-160. IEEE, (2021)