Search for persons
X
?
2023 China Automation Congress (CAC) ,
1
Photovoltaic Output Prediction Based on CNN-GRU-Attention A..:
, In:
?
The Handbook of Environmental Chemistry; ICT for Smart Water Systems: Measurements and Data Science ,
2
Satellite Remote Sensing of Soil Moisture for Hydrological ..:
, In:
?
Advances in Information Security; Network Security Empowered by Artificial Intelligence ,
3
Understanding the Ineffectiveness of the Transfer Attack in..:
, In:
?
IEEE INFOCOM 2024 - IEEE Conference on Computer Communications ,
4
Detecting Adversarial Spectrum Attacks via Distance to Deci..:
, In:
?
2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC) ,
5
Research on Recommendation System Based on Neural Network a..:
, In:
?
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning ,
6
How Can the Adversary Effectively Identify Cellular IoT Dev..:
, In:
?
2023 IEEE Conference on Communications and Network Security (CNS) ,
7
SecDINT: Preventing Data-oriented Attacks via Intel SGX Esc..:
, In:
?
2023 32nd International Conference on Computer Communications and Networks (ICCCN) ,
8
Data-Driven Next-Generation Wireless Networking: Embracing ..:
, In:
?
AI Embedded Assurance for Cyber Systems ,
9
Federated Learning for IoT Applications, Attacks and Defens..:
, In:
?
2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC) ,
10
Research on Stock History Data Mining and Prediction Algori..:
, In:
?
2023 42nd Chinese Control Conference (CCC) ,
11
A Single-Stage 3D Object Detector with Multi-scale Input an..:
, In:
?
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications ,
12
MUSTER: Subverting User Selection in MU-MIMO Networks:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
13
Perception-Aware Attack : Creating Adversarial Music via..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
14
Location Heartbleeding : The Rise of Wi-Fi Spoofing Atta..:
, In:
?
Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning ,
15