Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Light-Weight File Fragments Classification Using Depthwise Separable Convolutions., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 196-211. Springer, (2022)BeeCast: A Device-to-Device Collaborative Video Streaming System., , , and . IWCMC, page 178-183. IEEE, (2022)Edge-Assisted Label-Flipping Attack Detection in Federated Learning., , and . IEEE Open J. Commun. Soc., (2024)Design and Development of Adaptive Intrusion Management for Cyber-Based Systems. Purdue University, USA, (2018)RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning., , , , , and . ICFNDS, page 611-617. ACM, (2023)A Partition-Driven Integrated Security Architecture for Cyberphysical Systems., , , , and . Computer, 53 (3): 47-56 (2020)GiantClient: Video HotSpot for Multi-User Streaming., , and . IEEE Trans. Circuits Syst. Video Technol., 29 (9): 2833-2843 (2019)Guard: Attack-Resilient Adaptive Load Balancing in Distributed Streaming Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 4172-4186 (2022)Advanced Persistent False Data Injection Attacks Against Optimal Power Flow in Power Systems., , and . IWCMC, page 469-474. IEEE, (2021)A Security and Performance Driven Architecture for Cloud Data Centers., , , , and . CoRR, (2020)