Author of the publication

Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm.

, , , , and . SPDE, volume 1268 of Communications in Computer and Information Science, page 292-305. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments., , , , , and . Wirel. Pers. Commun., 116 (3): 1765-1783 (2021)Secure server-aided data sharing clique with attestation., , , , , , and . Inf. Sci., (2020)Security and privacy protection technologies in securing blockchain applications., , , , , and . Inf. Sci., (October 2023)Privacy and Integrity Protection of Metering Data in Smart Grid., , , , and . AsiaJCIS, page 40-47. IEEE, (2019)Privacy-preserving federated learning based on partial low-quality data., , , , and . J. Cloud Comput., 13 (1): 62 (December 2024)Histogram Publishing Algorithm Based on Sampling Sorting and Greedy Clustering., , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 81-91. Springer, (2019)Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 235-251 (2018)Semi-shadow file system: An anonymous files storage solution., , , , , and . Peer Peer Netw. Appl., 17 (1): 18-32 (January 2024)Design and implementation of blockchain-based digital advertising media promotion system., , , , and . Peer-to-Peer Netw. Appl., 14 (2): 482-496 (2021)An efficient blockchain-based anonymous authentication and supervision system., , , , , and . Peer Peer Netw. Appl., 16 (5): 2492-2511 (September 2023)