Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized Stacking Ensemble Model to Detect Phishing Websites., and . ACeS, volume 1487 of Communications in Computer and Information Science, page 379-388. Springer, (2021)Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC)., , and . IEEE Access, (2020)Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing., , , , , , , and . IEEE Access, (2024)A New Fast Local Laplacian Completed Local Ternary Count (FLL-CLTC) for Facial Image Classification., , , and . IEEE Access, (2020)Handoff and Route Optimization in Mobile Networks over IEEE 802.16e., and . Int. J. Mob. Comput. Multim. Commun., 5 (2): 32-45 (2013)Phishing Websites Detection by Using Optimized Stacking Ensemble Model., , , , , , , and . Comput. Syst. Sci. Eng., 41 (1): 109-125 (2022)VLMOO: A framework for benchmarking Variable-length Multiobjective Optimization problems with WSN focus., , , , , and . Softw. Impacts, (2022)Hybrid Techniques for Diagnosing Endoscopy Images for Early Detection of Gastrointestinal Disease Based on Fusion Features., , , and . Int. J. Intell. Syst., (2023)A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography., , and . IEEE Access, (2021)HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks., , , , and . IEEE Access, (2024)