Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure LTE-Based V2X Service., and . IEEE Internet of Things Journal, 5 (5): 3724-3732 (2018)Layered scalable WAVE security for VANET., , and . MILCOM, page 1566-1571. IEEE, (2015)Secure Resource Allocation for LTE-Based V2X Service., and . IEEE Trans. Vehicular Technology, 67 (12): 11324-11331 (2018)High-Accuracy Stochastic Computing-Based FIR Filter Design., , and . ICASSP, page 1140-1144. IEEE, (2018)A Comprehensive Analysis of Machine Learning-Based Intrusion Detection System for IoT-23 Dataset., , , and . INCoS, volume 527 of Lecture Notes in Networks and Systems, page 475-486. Springer, (2022)Stochastic Computing-Based Baseband Processing for Resource Constraint IoT Devices., , , , and . INCoS, volume 527 of Lecture Notes in Networks and Systems, page 20-34. Springer, (2022)