Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks., , , and . IEEE Trans. Computers, 63 (11): 2866-2879 (2014)The impact of scalable routing on lifetime of smart grid communication networks., , , and . Ad Hoc Networks, (2014)Security and Privacy in Biometrics-Based Systems.. Georgia Institute of Technology, Atlanta, GA, USA, (2021)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/65081).Modeling Large-Scale Manipulation in Open Stock Markets., , , , , and . IEEE Secur. Priv., 19 (6): 58-65 (2021)rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System., , , and . NDSS, The Internet Society, (2018)Methods for identifying traces of compression in audio., , and . SIU, page 1-4. IEEE, (2013)Carving Orphaned JPEG File Fragments., and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1549-1563 (2015)JpgScraper: An Advanced Carver for JPEG Files., and . IEEE Trans. Inf. Forensics Secur., (2020)A real time traffic simulator utilizing an adaptive fuzzy inference mechanism by tuning fuzzy parameters., , and . Appl. Intell., 36 (3): 698-720 (2012)Cryptographic Key Derivation from Biometric Inferences for Remote Authentication., , , , and . AsiaCCS, page 629-643. ACM, (2021)