Author of the publication

Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems.

, , , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2382-2391 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud., , , , , and . IEEE Trans. Ind. Informatics, 15 (4): 2338-2348 (2019)Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid., , , , and . IEEE Trans. Ind. Informatics, 16 (5): 3548-3557 (2020)A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0., , , and . IEEE Internet Things J., 7 (5): 4598-4606 (2020)ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem., , , and . ICC, page 1-6. IEEE, (2020)An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers., , , , , and . IEEE Syst. J., 14 (1): 1195-1205 (2020)Pattern recognition by embedded reduced number of angles fingerprint algorithm in biometric machines augments security., and . Int. J. Comput. Appl. Technol., 51 (2): 131-144 (2015)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)A Collaborative Security Framework for Software-Defined Wireless Sensor Networks., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)EnLoc: Data Locality-Aware Energy-Efficient Scheduling Scheme for Cloud Data Centers., , , and . ICC, page 1-6. IEEE, (2018)