Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
4
Breaching the Defense: Investigating FGSM and CTGAN Adversa..:
, In:
?
2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT) ,
5
Detection of Physical Adversarial Attacks on Traffic Signs ..:
, In:
?
2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) ,
6
False Data Injection Attacks Against High Voltage Transmiss..:
, In:
?
Shaping the Future of IoT with Edge Intelligence ,
7
Achieving Security and Privacy in NG-IoT using Blockchain T..:
, In:
?
Shaping the Future of IoT with Edge Intelligence ,
8
Edge Networking Technology Drivers for Next-generation Inte..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
9
ELECTRON: An Architectural Framework for Securing the Smart..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
10
Explainable AI-based Intrusion Detection in the Internet of..:
, In:
?
2023 IEEE Globecom Workshops (GC Wkshps) ,
11
5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generat..:
, In:
?
2023 12th International Conference on Modern Circuits and Systems Technologies (MOCAST) ,
12
5G Core PFCP Intrusion Detection Dataset:
, In:
?
2023 IEEE Future Networks World Forum (FNWF) ,
14
Elevating 5G Network Security: A Profound Examination of Fe..:
, In:
?
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) ,
15