Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast non-random chaff point generator for fuzzy vault biometric cryptosystems., , and . ICSET, page 199-204. IEEE, (2016)HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System., and . IEICE Trans. Inf. Syst., 100-D (8): 1729-1737 (2017)TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System., , and . IEEE Access, (2019)Self-Controllable Secure Location Sharing for Trajectory-Based Message Delivery on Cloud-Assisted VANETs., , , and . Sensors, 18 (7): 2112 (2018)Image Splicing Verification Based on Pixel-Based Alignment Method., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 198-212. Springer, (2012)Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing., , and . J. Supercomput., 74 (3): 1024-1044 (2018)An in-depth experimental study of anomaly detection using gradient boosted machine., and . Neural Comput. Appl., 31 (4): 955-965 (2019)Design of a Secure Digital Contents Delivery System in P2P Networks., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 311-321. Springer, (2005)A Fair and Reliable P2P E-Commerce Model Based on Collaboration with Distributed Peers., , , and . IWDC, volume 3741 of Lecture Notes in Computer Science, page 380-391. Springer, (2005)Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption., , , and . Communications and Multimedia Security, volume 6109 of Lecture Notes in Computer Science, page 214-232. Springer, (2010)