Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on Ä robust color image watermarking with singular value decomposition method"., , and . Adv. Eng. Softw., (2016)Efficient and secure cryptosystem for fingerprint images in wavelet domain., , , and . Multim. Tools Appl., 77 (8): 9325-9339 (2018)Unsupervised Manifold Alignment for Wifi RSSI Indoor Localization., , , and . CCECE, page 1-7. IEEE, (2020)Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing., , , and . CoRR, (2020)ssHealth: Toward Secure, Blockchain-Enabled Healthcare Systems., , , , , and . IEEE Netw., 34 (4): 312-319 (2020)Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users., , , , , and . WF-IoT, page 633-638. IEEE, (2021)Autonomous MEC Selection in Federated Next-Gen Networks via Deep Reinforcement Learning., and . GLOBECOM, page 2045-2050. IEEE, (2023)Navigation and Obstacle Avoidance System in Unknown Environment., , , , , and . CCECE, page 1-4. IEEE, (2020)Misbehavior detection in amplify-and-forward cooperative OFDM systems., , and . ICC, page 5345-5349. IEEE, (2013)IOT: Advance physical signaling methods for Power Line networking system., , , and . CCECE, page 1-5. IEEE, (2017)