Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cross Layer Design and Flower Pollination Optimization Algorithm for Secured Energy Efficient Framework in Wireless Sensor Network., and . Wireless Personal Communications, 112 (3): 1601-1628 (2020)Intelligent Hyperparameter-Tuned Deep Learning-Based Android Malware Detection and Classification Model., and . J. Circuits Syst. Comput., 32 (11): 2350191:1-2350191:16 (July 2023)Detection and robustness evaluation of android malware classifiers., , , , , , , , and . J. Comput. Virol. Hacking Tech., 18 (3): 147-170 (2022)A strategic model using structural equation modeling and fuzzy logic in supplier selection., , and . Expert Syst. Appl., 38 (1): 458-474 (2011)An efficient scheme for secure feature location using data fusion and data mining in internet of things environment., , , , and . Softw. Pract. Exp., 52 (3): 642-657 (2022)Smart meter data analytics using R and Hadoop., , and . EIT, page 623-629. IEEE, (2017)Multi-Modal Medical Image Fusion Using Curvelet Algorithm.. ICACCI, page 2453-2458. IEEE, (2018)An efficient and secure feature location approach in source code using Jacobian matrix-based clustering., , , , and . Neural Comput. Appl., 33 (12): 7235-7247 (2021)Hybrid enhanced ant colony algorithm and enhanced bee colony algorithm for grid scheduling., , and . Int. J. Grid Util. Comput., 2 (1): 45-58 (2011)Pareto based hybrid Meta heuristic ABC - ACO approach for task scheduling in computational grids., , and . Int. J. Hybrid Intell. Syst., 11 (4): 241-255 (2014)