Author of the publication

Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things.

, , , , and . J. Syst. Archit., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Applications in Power Systems: A Bibliometric Analysis., , , and . CoRR, (2019)Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection., , and . CoRR, (2019)Privacy Preserving Abnormality Detection: A Deep Learning Approach., , , and . Handbook of Big Data Privacy, Springer, (2020)Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems., , , and . IEEE Internet Things J., 8 (17): 13712-13722 (2021)Resilient Scheduling of Networked Microgrids Against Real-Time Failures., , , , and . IEEE Access, (2021)Extended Kalman Filter-Based Parallel Dynamic State Estimation., and . IEEE Trans. Smart Grid, 6 (3): 1539-1549 (2015)Communication Layer Security in Smart Farming: A Survey on Wireless Technologies., , , , , , and . CoRR, (2022)A Deep Neural Network Combined with Radial Basis Function for Abnormality Classification., , , , , and . Mob. Networks Appl., 26 (6): 2318-2328 (2021)A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems., , , , , , and . IEEE Syst. J., 17 (4): 5152-5160 (December 2023)An improved two-hidden-layer extreme learning machine for malware hunting., , , , , , and . Comput. Secur., (2020)