Author of the publication

Topological Similarity-Based Feature Selection for Graph Classification.

, , , , and . Comput. J., 58 (9): 1884-1893 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks., , , , , , and . IEEE Access, (2017)Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications., , , , and . Sensors, 18 (10): 3191 (2018)Semi-supervised feature selection using co-occurrent frequent subgraphs., , , and . ICUIMC, page 65. ACM, (2013)Blockchain-based Personal Data Trading System using Decentralized Identifiers and Verifiable Credentials., , , and . ICTC, page 150-154. IEEE, (2021)An Efficient Method for Computing Similarity Between Frequent Subgraphs., , and . CGC, page 566-567. IEEE Computer Society, (2013)A lightweight three-factor authentication protocol for digital rights management system., , , , and . Peer-to-Peer Netw. Appl., 13 (5): 1340-1356 (2020)IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment., , , , and . IEEE Access, (2020)RDB2RDF: completed transformation from relational database into RDF ontology., , , , and . ICUIMC, page 88:1-88:7. ACM, (2014)ProcAnalyzer: Effective Code Analyzer for Tuning Imperative Programs in SAP HANA., , , , , and . SIGMOD Conference, page 2709-2712. ACM, (2020)LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things., , , , , , and . IEEE Access, (2020)