Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems., and . CIC, page 89-98. IEEE, (2022)Decentralized Public Key Infrastructure for Internet-of-Things., , , and . MILCOM, page 907-913. IEEE, (2018)How Deep Learning Is Making Information Security More Intelligent., and . IEEE Secur. Priv., 17 (3): 56-65 (2019)Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations., , , , and . AsiaCCS, page 501-515. ACM, (2021)HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks., , , and . MILCOM, page 1298-1304. IEEE, (2015)CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks., , and . ICDCS Workshops, page 7-12. IEEE Computer Society, (2017)Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning., , and . SMARTCOMP, page 69-74. IEEE, (2019)Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation., , and . AsiaCCS, page 127-140. ACM, (2020)Blockchain-Based PKI Solutions for IoT., and . CIC, page 9-15. IEEE Computer Society, (2018)Real-time Digital Signatures for Named Data Networking., , and . ICN, page 149-151. ACM, (2020)