Search for persons
X
?
2023 IEEE Conference on Dependable and Secure Computing (DSC) ,
3
Detecting Web Application DAST Attacks with Machine Learnin:
, In:
?
2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) ,
4
Adversarial Robustness of Multi-agent Reinforcement Learnin..:
, In:
?
2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) ,
6
Network-aware Mitigation of Undetectable PMU Time Synchroni..:
, In:
?
2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS) ,
7
Next Steps in Security for Time Synchronization: Experience..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
8
Adversarial Attacks on Continuous Authentication Security: ..:
, In:
?
2023 Intelligent Methods, Systems, and Applications (IMSA) ,
12
A Comparative Study of Weight Initialization Techniques for..:
, In:
?
International Series in Operations Research & Management Science; Decision Sciences for COVID-19 ,
13
Hyperparameters Optimization of Deep Convolutional Neural N..:
, In:
?
2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES) ,
14