Author of the publication

Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach.

, , , , , and . Future Gener. Comput. Syst., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Interconnection of Lots of Links (TRILL) Distributed Layer 3 Gateway., , , , and . RFC, (September 2016)Transparent Interconnection of Lots of Links (TRILL): Edge Directory Assistance Mechanisms., , , and . RFC, (June 2017)Identification of microRNA precursors based on random forest with network-level representation method of stem-loop structure., , , , , , and . BMC Bioinform., (2011)CLPNet: Cleft Lip and Palate Surgery Support With Deep Learning., , , , , and . EMBC, page 3666-3672. IEEE, (2019)Fuzzy Expert System for the Competitiveness Evaluation of Shipbuilding Companies., , , and . J. Softw., 9 (3): 663-667 (2014)DDHCN: Dual decoder Hyperformer convolutional network for Downstream-Adaptable user representation learning on app usage., , , and . Expert Syst. Appl., 237 (Part B): 121564 (March 2024)Application progress of artificial intelligence in traditional Chinese medicine nursing., , and . ISAIMS, page 69-74. ACM, (2021)Dyncast: Use Dynamic Anycast to Facilitate Service Semantics Embedded in IP address., , , , and . HPSR, page 1-8. IEEE, (2021)Deep Density-Aware Count Regressor., , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2856-2863. IOS Press, (2020)Feature importance analysis in guide strand identification of microRNAs., , , , , and . Comput. Biol. Chem., 35 (3): 131-136 (2011)