Author of the publication

Text-Defend: Detecting Adversarial Examples using Local Outlier Factor.

, and . ICSC, page 118-122. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders., , and . Int. J. Bus. Process. Integr. Manag., 8 (2): 114-119 (2017)Machine Learning for Cybersecurity - Innovative Deep Learning Solutions. Springer Briefs in Computer Science Springer, (2022)New Approach to Malware Detection Using Optimized Convolutional Neural Network.. CoRR, (2023)Text-Defend: Detecting Adversarial Examples using Local Outlier Factor., and . ICSC, page 118-122. IEEE, (2023)Detecting software vulnerabilities using Language Models.. CoRR, (2023)Can pruning make Large Language Models more efficient?, and . CoRR, (2023)Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System., , , , , and . IEEE Trans. Consumer Electron., 70 (1): 4249-4257 (February 2024)Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication., , , , , and . IEEE Trans. Consumer Electron., 70 (1): 1370-1379 (February 2024)Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET., , , , , , and . IEEE Trans. Consumer Electron., 70 (1): 1747-1756 (February 2024)Net Neutrality Around the Globe: A Survey., , , and . ICICT, page 480-488. IEEE, (2020)