Author of the publication

Securing big data and IoT networks in smart cyber-physical environments.

, and . ICSDE, page 189-194. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A preceding activation scheme with graph unfolding for the parallel processing system-array., , , and . SC, page 675-684. ACM, (1989)Data Access Pattern Analysis on Stream Mining Algorithms for Cloud Computation., , and . PDPTA, page 36-42. CSREA Press, (2010)Editor's Message to Special Issue of Young Researchers' Papers.. J. Inf. Process., (2018)User-centric Distributed Route Planning in Smart Cities based on Multi-objective Optimization., , , , , , , , and . SMARTCOMP, page 77-82. IEEE, (2021)Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption., , , , and . SMARTCOMP, page 229-234. IEEE, (2022)Improvement in accuracy of multiple sequence alignment using novel group-to-group sequence alignment algorithm with piecewise linear gap cost., , and . BMC Bioinform., (2006)Topological measurement of deep neural networks using persistent homology., and . Ann. Math. Artif. Intell., 90 (1): 75-92 (2022)EPT-GCN: Edge propagation-based time-aware graph convolution network for POI recommendation., and . Neurocomputing, (July 2023)A study on individual mobility patterns based on individuals' familiarity to visited areas., and . Int. J. Pervasive Comput. Commun., 12 (1): 23-48 (2016)NER-to-MRC: Named-Entity Recognition Completely Solving as Machine Reading Comprehension., , , , and . CoRR, (2023)