Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-aware malicious webpage detection using convolutional neural network., , , and . Multim. Tools Appl., 83 (3): 8145-8163 (January 2024)An effective output-oriented algorithm for low power multipartition architecture., , , , , and . ICECS, page 609-612. IEEE, (2000)Power and Area Efficiency NoC Router Design for Application-Specific SoC by Using Buffer Merging and Resource Sharing., , and . ACM Trans. Design Autom. Electr. Syst., 19 (4): 36:1-36:21 (2014)Secure data-sharing using distributed environmental matching keys., and . Pervasive Mob. Comput., (2017)A Fault Tolerant Mechanism for UE Authentication in 5G Networks., , , , and . Mob. Networks Appl., 26 (4): 1650-1667 (2021)Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating., , and . IEEE Trans. Circuits Syst. I Regul. Pap., 60-I (6): 1478-1486 (2013)LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system., , and . FUZZ-IEEE, page 796-801. IEEE, (2009)A low power scheduling method using dual Vdd and dual Vth., , , and . ISCAS (1), page 684-687. IEEE, (2005)Distinguishable error detection method for Network on Chip., , , and . ISCAS, page 3733-3736. IEEE, (2010)Low power scheduling method using multiple supply voltages., , , and . ISCAS, IEEE, (2006)