Author of the publication

Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems.

, , , , , , and . ARES, page 52:1-52:8. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Factor Analysis for Finding Invariant Neural Descriptors of Human Emotions., , , , and . Complex., (2018)Syntheses of a PSPICE model of a titanium-dioxide memristor and Wien memristor generator., and . ECCTD, page 1-4. IEEE, (2013)On the stability of high order Sigma-Delta modulators., , and . ICECS, page 1383-1386. IEEE, (2001)Application of New Metal-Oxide Memristor Models in Digital and Analog Electronic Circuits., and . SMACD, page 1-4. IEEE, (2023)A Simplified Model of Tantalum Oxide Based Memristor and Application in Memory Crossbars., and . MOCAST, page 1-4. IEEE, (2021)Analysis and Evaluation of Distance Schooling and Learning with Respect to ICT Usage During COVID-19 Period in Bulgaria., , , and . WorldCIST (3), volume 1367 of Advances in Intelligent Systems and Computing, page 195-201. Springer, (2021)A method for searching the limit cycles of high order sigma-delta modulators.. ECCTD, page 543-546. IEEE, (2009)Evaluation of Distance Based Amplitude panning for spatial audio., , and . ICASSP, page 285-288. IEEE, (2010)On the restrictions of the sensitivities in single-amplifier biquadratic active filters., and . I. J. Circuit Theory and Applications, 23 (3): 247-252 (1995)Humanoid robot control with EEG brainwaves., , and . IDAACS, page 238-242. IEEE, (2017)