Author of the publication

An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm.

, , , , and . Comput., 9 (3): 58 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach for analysis of attack graph., , , and . ISI, page 7-12. IEEE, (2017)Discussion on convergence of Legendre polynomial for numerical solution of integral equations., , and . Appl. Math. Comput., 193 (2): 335-339 (2007)Computational methods for integrals involving functions and Daubechies wavelets., , and . Appl. Math. Comput., 189 (2): 1828-1840 (2007)Development, Implementation, and User Evaluation of COVID-19 Dashboard in a Third-Level Hospital in Iran., , , , , , and . Appl. Clin. Inform., 12 (5): 1091-1100 (2021)An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm., , , , and . Comput., 9 (3): 58 (2020)Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan Environment., , , , and . UCET, page 1-4. IEEE, (2020)Enhancing Security Awareness Through Gamified Approaches., , , , , and . CoRR, (2024)An Adversarial Attack Detection Paradigm With Swarm Optimization., , , , and . IJCNN, page 1-7. IEEE, (2020)Numerical solution of the integral equation of the second kind by using wavelet bases of Hermite cubic splines., and . Appl. Math. Comput., 183 (1): 134-141 (2006)Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners., , and . Comput., 12 (11): 235 (October 2023)