Picture for Muhammad Ismail

Muhammad Ismail

Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning

Add code
Jun 15, 2022
Figure 1 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 2 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 3 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 4 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Viaarxiv icon

Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks

Add code
Apr 24, 2021
Figure 1 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 2 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 3 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 4 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Viaarxiv icon

Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids

Add code
Apr 05, 2021
Figure 1 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 2 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 3 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 4 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Viaarxiv icon

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

Add code
Sep 06, 2018
Figure 1 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 2 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 3 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 4 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Viaarxiv icon