Author of the publication

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems.

, , , , , and . Future Gener. Comput. Syst., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demonstrating the Versatility of a Low Cost Measurement Testbed for Wireless Sensor Networks with a Case Study on Radio Duty Cycling Protocols., , , , and . IoT 360 (1), volume 169 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-230. (2015)Dynamic Resource Allocation for MIMO Cognitive Networks With Low Control Traffic and Low Computational Complexity., , , , and . IEEE Trans. Vehicular Technology, 62 (4): 1732-1740 (2013)Quantization and Transmission of the Energy Measures for Cooperative Spectrum Sensing., , , and . VTC Spring, page 1-5. IEEE, (2010)FTT-openFlow, on the way towards real-time SDN., , and . SIGBED Review, 13 (4): 49-54 (2016)Cooperative Spectrum Sensing for Cognitive Radios Using Distributed Q-Learning., , , and . VTC Fall, page 1-5. IEEE, (2011)Finite Order Compensation of Non Linearities in DVB-S2 Communications., , , , and . VTC Fall, page 1-5. IEEE, (2011)CSI-Based Versus RSS-Based Secret-Key Generation Under Correlated Eavesdropping., , , , and . IEEE Trans. Commun., 69 (3): 1868-1881 (2021)Passenger influence on the performance of time reversal in intra-vehicular environment., , , , , and . ICNC, page 681-685. IEEE Computer Society, (2013)A Twofold Group Key Agreement Protocol for NoC based MPSoCs., , , , , and . PST, page 1-2. IEEE Computer Society, (2018)Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems., , , , and . ACeS, volume 1487 of Communications in Computer and Information Science, page 329-339. Springer, (2021)