Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things (IoT) security dataset evolution: Challenges and future directions., , , , , , , , and . Internet Things, (July 2023)A model-driven penetration test framework for Web applications., and . PST, page 173-180. IEEE, (2010)Towards a Robust and Trustworthy Machine Learning System Development., , , , , and . CoRR, (2021)Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems., , , and . GLOBECOM, page 880-885. IEEE, (2023)Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing., , and . GLOBECOM, page 1-6. IEEE, (2021)ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol., , , , , , and . BigDataSecurity/HPSC/IDS, page 122-129. IEEE, (2023)A Systematic Approach to Web Application Penetration Testing Using TTCN-3., , and . MCETECH, volume 78 of Lecture Notes in Business Information Processing, page 1-16. Springer, (2011)Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing., , , and . GLOBECOM, page 4854-4859. IEEE, (2022)Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication., , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 400-414. Springer, (2023)Better entity matching with transformers through ensembles., , and . Knowl. Based Syst., (2024)