Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach., , and . CSR, page 432-439. IEEE, (2023)Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models., , , and . TPS-ISA, page 91-100. IEEE, (2023)Blockchain-based Smart Supply Chain Management., , and . DSA, page 203-208. IEEE, (2022)Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework., , , , and . IJCNN, page 1-8. IEEE, (2022)Adversarial Attacks on Deep Learning-Based UAV Navigation Systems., , , and . CNS, page 1-6. IEEE, (2023)A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection., , , , , and . SMC, page 1927-1934. IEEE, (2021)EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks., , , and . IEEE Access, (2019)Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1291-1306 (2021)Detecting Sybil Attacks Using Proofs of Work and Location in VANETs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 39-53 (2022)Detecting Electricity Theft Cyber-Attacks in AMI Networks Using Deep Vector Embeddings., , , , and . IEEE Syst. J., 15 (3): 4189-4198 (2021)