Author of the publication

Learning Games for Defending Advanced Persistent Threats in Cyber Systems.

, , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (4): 2410-2422 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt., , , , and . IEEE Access, (2018)Efficiently Constructing Adversarial Examples by Feature Watermarking., , , , , and . CoRR, (2020)A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy., , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3333-3346 (April 2023)Deep Metric Learning for K Nearest Neighbor Classification., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (1): 264-275 (2023)the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)Fair and Differentially Private Distributed Frequency Estimation., , , , and . CoRR, (2021)More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design., , , , and . ACM Comput. Surv., 54 (7): 136:1-136:37 (2022)Machine Unlearning: A Survey., , , , and . ACM Comput. Surv., 56 (1): 9:1-9:36 (January 2024)Privacy Intelligence: A Survey on Image Sharing on Online Social Networks., , , and . CoRR, (2020)An iteration-based differentially private social network data release., , , , and . Comput. Syst. Sci. Eng., (2018)