Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SwGridNet: A Deep Convolutional Neural Network based on Grid Topology for Image Classification.. CoRR, (2017)Detection and Analysis of Intrusion Attacks Using Deep Neural Networks.. NBiS, volume 526 of Lecture Notes in Networks and Systems, page 258-266. Springer, (2022)A New Authentication Method with Distributed Hash Table for P2P Network., , , , , and . AINA Workshops, page 483-488. IEEE Computer Society, (2008)Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network., , , and . BWCCA, page 389-394. IEEE Computer Society, (2014)A Proposal of Privacy Management Architecture., , , , , and . SAINT, page 161-164. IEEE Computer Society, (2010)A Robust P2P Information Sharing System and its Application to Communication Support in Natural Disasters., , , and . Int. J. Softw. Sci. Comput. Intell., 5 (4): 20-39 (2013)Proposal and Performance Evaluation of Hash-based Authentication for P2P Network., , , , and . J. Inf. Process., (2009)A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast., , , , , , and . CISIS, page 337-344. IEEE Computer Society, (2010)SS5 design of a P2P information sharing system and its application to communication support in natural disaster., , , and . ICCI*CC, page 118-125. IEEE Computer Society, (2013)A Flexible and Secure Access Control Scheme Using Social Behavior in Real World., , , , , and . J. Mobile Multimedia, 6 (2): 145-157 (2010)