Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques., , , and . IEEE Access, (2024)A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 8136-8151 (2022)Protection of Privacy in Biometric Data., , , , and . IEEE Access, (2016)Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method., , , , , and . IEEE Access, (2023)A Comprehensive Study of ChatGPT: Advancements, Limitations, and Ethical Considerations in Natural Language Processing and Cybersecurity., , , , and . Inf., 14 (8): 462 (2023)Aspect-oriented model-driven code generation: A systematic mapping study., and . Inf. Softw. Technol., 55 (2): 395-411 (2013)A Model for Computing Skyline Data Items in Cloud Incomplete Databases., , , and . ANT/EDI40, volume 170 of Procedia Computer Science, page 249-256. Elsevier, (2020)Protection of Big Data Privacy., , , , and . IEEE Access, (2016)Intelligent Urban Cities: Optimal Path Selection Based on Ad Hoc Network., , and . IEEE Access, (2023)Detecting Signal Spoofing Attack in UAVs Using Machine Learning Models., , and . IEEE Access, (2021)