Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs)., , and . SIN, page 1-8. IEEE, (2023)Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks., , , , , and . Wirel. Pers. Commun., 95 (3): 3141-3166 (2017)Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry., , , , , and . IEEE Trans. Ind. Informatics, 18 (11): 8316-8325 (2022)A Privacy Enhanced Security Framework for Android Users., , and . ICITCS, page 1-6. IEEE Computer Society, (2015)Leveraging Compiler Optimization for Code Clone Detection., , and . SEKE, page 516-521. KSI Research Inc., (2021)Permission recommender system for Android., , , and . SIN, page 311-314. ACM, (2017)Detecting intelligent malware on dynamic Android analysis environments., , and . ICITST, page 414-419. IEEE, (2015)Privacy Protection Framework for Android., , , , , , and . IEEE Access, (2022)Software Defect Prediction Based on GUHA Data Mining Procedure and Multi-Objective Pareto Efficient Rule Selection., and . Int. J. Softw. Sci. Comput. Intell., 6 (2): 1-29 (2014)Multi-View Learning for Repackaged Malware Detection., , and . ARES, page 53:1-53:9. ACM, (2021)