Author of the publication

Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection.

, , , , , , and . PeerJ Comput. Sci., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transceiver Design to Maximize the Weighted Sum Secrecy Rate in Full-Duplex SWIPT Systems., , and . IEEE Signal Process. Lett., 23 (6): 883-887 (2016)Hybrid Satellite-Aerial-Terrestrial Networks for Public Safety., , and . PSATS, volume 148 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 106-113. (2014)Sum Rate Analysis and Power Allocation for Massive MIMO Systems With Mismatch Channel., , , , and . IEEE Access, (2018)Game-theoretic hierarchical resource allocation in ultra-dense networks., , , , and . PIMRC, page 1-6. IEEE, (2016)A Destination-Aided Wireless Energy Transfer Scheme in Multi-Antenna Relay Sensor Networks., , , , and . IEEE Wirel. Commun. Lett., 8 (3): 689-692 (2019)Average Utility Function Maximization-Based Multi-UAV Cooperative Perception and Trajectory Optimization., , , and . PIMRC, page 1-6. IEEE, (2023)Roadside IoT Sensor-Based Crack Detection for Smart Roads., , , , , and . VTC Fall, page 1-6. IEEE, (2023)Destination-aided Wireless Power Transfer in Energy-limited Cognitive Relay Systems., , , and . CoRR, (2016)Transceiver Optimization in Full Duplex SWIPT Systems with Physical Layer Security., , and . ChinaCom (1), volume 209 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-13. Springer, (2016)Delay-Based Congestion Control for Multipath TCP in Heterogeneous Wireless Networks., , , , and . WCNC Workshops, page 1-6. IEEE, (2019)