Alert button
Picture for Muhammad Ismail

Muhammad Ismail

Alert button

Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning

Add code
Bookmark button
Alert button
Jun 15, 2022
Cihat Keçeci, Mohammad Shaqfeh, Fawaz Al-Qahtani, Muhammad Ismail, Erchin Serpedin

Figure 1 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 2 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 3 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Figure 4 for Clustered Scheduling and Communication Pipelining For Efficient Resource Management Of Wireless Federated Learning
Viaarxiv icon

Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks

Add code
Bookmark button
Alert button
Apr 24, 2021
Osman Boyaci, Mohammad Rasoul Narimani, Katherine Davis, Muhammad Ismail, Thomas J Overbye, Erchin Serpedin

Figure 1 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 2 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 3 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Figure 4 for Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Viaarxiv icon

Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids

Add code
Bookmark button
Alert button
Apr 05, 2021
Osman Boyaci, Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Muhammad Ismail, Katherine Davis, Erchin Serpedin

Figure 1 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 2 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 3 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Figure 4 for Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Viaarxiv icon

Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

Add code
Bookmark button
Alert button
Sep 06, 2018
Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, Erchin Serpedin

Figure 1 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 2 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 3 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Figure 4 for Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Viaarxiv icon