Author of the publication

Towards Real-time Video Content Detection in Resource Constrained Devices.

, , , and . IJCNN, page 1-8. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing service maintainability by monitoring and auditing SLA in cloud computing., , , , , , and . Clust. Comput., 24 (3): 1659-1674 (2021)Improving Intrusion Detection Confidence Through a Moving Target Defense Strategy., , and . GLOBECOM, page 1-6. IEEE, (2021)A Reminiscent Intrusion Detection Model Based on Deep Autoencoders and Transfer Learning., , and . GLOBECOM, page 1-6. IEEE, (2021)A motion-based approach for real-time detection of pornographic content in videos., , , and . SAC, page 1066-1073. ACM, (2022)Federated learning for reliable model updates in network-based intrusion detection., , , and . Comput. Secur., (October 2023)Towards Reliable Intrusion Detection in High Speed Networks., and . SBRC Companion, page 169-176. (2019)A Host-based Intrusion Detection Model Based on OS Diversity for SCADA., , , and . IECON, page 691-696. IEEE, (2020)Towards Real-time Video Content Detection in Resource Constrained Devices., , , and . IJCNN, page 1-8. IEEE, (2020)A Non-interactive One-Time Password-Based Method to Enhance the Vault Security., , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 201-213. Springer, (2024)Detection of Service Provider Hardware Over-commitment in Container Orchestration Environments., , and . GLOBECOM, page 6354-6359. IEEE, (2022)