Author of the publication

Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach.

, , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 439-458. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-aware Mitigation of Undetectable PMU Time Synchronization Attacks., and . SmartGridComm, page 1-7. IEEE, (2020)Correlation-based Detection of PMU Time Synchronization Attacks., and . SmartGridComm, page 1-6. IEEE, (2018)On the impact of RN16 decoding errors on time throughput of RFID systems., , and . WCNC, page 1-6. IEEE, (2016)Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning., , and . IJCAI, page 162-170. ijcai.org, (2023)Throughput Evaluation of Dynamic Frame Slotted ALOHA for Spatially Distributed RFID Tags., , and . VTC Fall, page 1-5. IEEE, (2016)Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids., , and . SmartGridComm, page 1-7. IEEE, (2023)Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1., , , , and . ISPCS, page 1-6. IEEE, (2019)Security of Time Synchronization for PMU-based Power System State Estimation: Vulnerabilities and Countermeasures.. Royal Institute of Technology, Stockholm, Sweden, (2021)base-search.net (ftkthstockholm:oai:DiVA.org:kth-304272).Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach., , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 439-458. Springer, (2019)Detecting Web Application DAST Attacks with Machine Learning., , and . DSC, page 1-8. IEEE, (2023)