Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alarm notification to tower monitoring system in oneM2M based IoT networks., , , , , and . ICACCI, page 2405-2409. IEEE, (2016)Security enhancement in tower monitoring system of oneM2M network., , and . ANTS, page 1-5. IEEE, (2016)A 6.7 GHz, 89.33 μW Power and 81.26% Tuning Range Dual Input Ring VCO with PMOS Varactor., , and . J. Circuits Syst. Comput., 32 (12): 2350199:1-2350199:15 (August 2023)Geo-intelligence based automatic verification and optimization of manual field survey for OFC network planning., , , , , , , and . ANTS, page 1-5. IEEE, (2016)C4.5 Decision Tree Machine Learning Algorithm Based GIS Route Identification., , , , , and . ICUFN, page 213-218. IEEE, (2018)A Hierarchical Attention Networks based Model for Bug Report Prioritization., and . ISEC, page 12:1-12:5. ACM, (2024)Design Analysis of an Energy-Efficient Low-Power Dynamic Comparator Using NMOS Based Preamplifier., , and . ICCCNT, page 1-6. IEEE, (2023)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , and . SP, page 712-729. IEEE, (2021)Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , , and . CoRR, (2019)BigMAC: Fine-Grained Policy Analysis of Android Firmware., , , , and . USENIX Security Symposium, page 271-287. USENIX Association, (2020)