Author of the publication

Intrusion Detection for WiFi Network: A Deep Learning Approach.

, , , and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-104. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wearable privacy protection with visual bubble., , and . ICME Workshops, page 1-6. IEEE Computer Society, (2016)Visual Bubble: Protecting Privacy in Wearable Cameras., , and . IEEE Consumer Electronics Magazine, 7 (1): 95-105 (2018)On the Control Strategies that Humans use to Interact with Linear Systems with Output Nonlinearities., , , and . SMC, page 3732-3737. IEEE, (2018)Intrusion Detection for WiFi Network: A Deep Learning Approach., , , and . WICON, volume 264 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 95-104. Springer, (2018)Attitude Control on SO(3) with Sinusoidal Torques., , , and . ACC, page 640-645. IEEE, (2018)Consensus on SO(3) with Piecewise-Continuous Sinusoids., , , and . ACC, page 1635-1640. IEEE, (2018)Missing Data Imputation for Machine Learning., , , and . IoTaaS, volume 271 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 67-72. Springer, (2018)The Roles of Feedback and Feedforward as Humans Learn to Control Unknown Dynamic Systems., , , and . IEEE Trans. Cybernetics, 48 (2): 543-555 (2018)Orientation control on SO(3) with piecewise sinusoids., , and . Automatica, (2019)A subsystem identification technique for modeling control strategies used by humans., , , and . ACC, page 2827-2832. IEEE, (2014)