Author of the publication

Interactive Teaching Methods in Information Security Course.

, , and . ScalCom-EmbeddedCom, page 489-493. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

T-BFA: Targeted Bit-Flip Adversarial Weight Attack., , , , , and . CoRR, (2020)RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy., , , , , , , and . CoRR, (2021)Monocular Visual-Inertial Odometry for Agricultural Environments., , , and . IEEE Access, (2022)Anomaly Segmentation for High-Resolution Remote Sensing Images Based on Pixel Descriptors., , , , and . AAAI, page 4426-4434. AAAI Press, (2023)GenRe: A General Replication Scheme over an Abstraction of DHTs., , , and . COMPSAC, page 43-52. IEEE Computer Society, (2013)Tight Bounds on the Estimation Distance Using Wavelet., , , , and . WAIM, volume 4016 of Lecture Notes in Computer Science, page 460-471. Springer, (2006)Interactive Teaching Methods in Information Security Course., , and . ScalCom-EmbeddedCom, page 489-493. IEEE Computer Society, (2009)One-Step Detection Paradigm for Hyperspectral Anomaly Detection via Spectral Deviation Relationship Learning., , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)PU-KBS: A Robust Positive and Unlabeled Learning Framework With Key Band Selection for One-Class Hyperspectral Image Classification., , , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)A Reputation Management Framework Based on Global Trust Model for P2P Systems., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 896-899. Springer, (2006)