A game-theoretic approach to computation offloading in software-defined D2D-enabled vehicular networks RNK Mensah, L Zhiyuan, AA Okine, JM Adeke 2021 2nd Information Communication Technologies Conference (ICTC), 34-38, 2021 | 11 | 2021 |
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables JM Adeke, G Liu, J Zhao, N Wu, HM Bashir Future Internet 15 (12), 405, 2023 | 4 | 2023 |
An efficient approach based on parameter optimization for network traffic classification using machine learning JM Adeke, J Chen, L Zhang, RNK Mensah, K Tong 2020 7th International Conference on Dependable Systems and Their …, 2020 | 3 | 2020 |
Detecting high-resolution adversarial images with few-shot deep learning J Zhao, J Wu, JM Adeke, S Qiao, J Wang Remote Sensing 15 (9), 2379, 2023 | 2 | 2023 |
Boosting Adversarial Training with Learnable Distribution. K Chen, J Wang, JM Adeke, G Liu, Y Dai Computers, Materials & Continua 78 (3), 2024 | 1 | 2024 |
EITGAN: A Transformation-based Network for recovering adversarial examples J Zhao, J Wu, JM Adeke, G Liu, Y Dai Electronic Research Archive 31 (11), 6634-6656, 2023 | 1 | 2023 |
Investigating the impact of feature selection on adversarial transferability in intrusion detection system JM Adeke, G Liu, L Amoah, OJ Nwali Computers & Security 151, 104327, 2025 | | 2025 |
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism. N Wu, X Chen, JM Adeke, J Zhao Computers, Materials & Continua 78 (3), 2024 | | 2024 |
Passenger Flow Prediction Method based on Hybrid Algorithm: Intelligent Transportation System A Raza, G Liu, JM Adeke, J Cheng, D Attique European Journal of Applied Science, Engineering and Technology 2 (1), 12-20, 2024 | | 2024 |
On the Covert Performance of Ambient Backscatter Communications S Qiao, J Zhao, JM Adeke, K Chen, G Liu 2023 International Conference on Networks, Communications and Intelligent …, 2023 | | 2023 |