Author of the publication

Enhanced Cyber-Physical Security through Deep Learning Techniques.

, and . CPS Summer School, PhD Workshop, volume 2457 of CEUR Workshop Proceedings, page 72-83. CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Crowd Density and Crowd Size Estimation., , , , and . J. Softw., 9 (3): 757-762 (2014)EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks., , , , , , , and . ACM Trans. Priv. Secur., 25 (3): 23:1-23:24 (2022)Towards desirable decision boundary by Moderate-Margin Adversarial Training., , , , , , and . Pattern Recognit. Lett., (September 2023)Evolving defense mechanism for future network security., , , , , , and . IEEE Commun. Mag., 53 (4): 45-51 (2015)GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy., , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (13): 2251015:1-2251015:26 (2022)Eliminating Control Plane Overload via Measurement Task Placement., , , , , , and . IEEE/ACM Trans. Netw., 31 (4): 1717-1731 (August 2023)A Review of Geological Applications of High-Spatial-Resolution Remote Sensing Data., , , and . J. Circuits Syst. Comput., 29 (6): 2030006:1-2030006:23 (2020)Empowering Network Security With Programmable Switches: A Comprehensive Survey., , , , , , , and . IEEE Commun. Surv. Tutorials, 25 (3): 1653-1704 (2023)A secure routing model based on distance vector routing algorithm., , , , , and . Sci. China Inf. Sci., 57 (1): 1-13 (2014)Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks., , , , , and . Sci. China Inf. Sci., 65 (8): 1-3 (2022)