Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures., , , , , and . ACM Comput. Surv., 53 (6): 122:1-122:37 (2021)Security & Privacy in IoT Using Machine Learning & Blockchain: Threats & Countermeasures., , , and . CoRR, (2020)Epileptic Seizures Prediction Using Machine Learning Methods., , and . Comput. Math. Methods Medicine, (2017)Measurements and characterization of power transformer and low voltage access network for NB-PLC., , , and . Int. J. Commun. Syst., (2017)HVDC Transmission Line Fault Identification: A Learning Based UAV Control Strategy., , , , , , and . IEEE Access, (2022)UAV Reconnaissance using Bio-Inspired Algorithms: Joint PSO and Penguin Search Optimization Algorithm (PeSOA) Attributes., , , and . CCNC, page 1-6. IEEE, (2019)Channel blocking analysis and availability prediction in cognitive radio networks., , and . ICNC, page 963-968. IEEE Computer Society, (2017)Investigating Reliability for URLLC in EUHT-5G a new IMT-2020 Candidate Technology., , , , and . GLOBECOM (Workshops), page 662-667. IEEE, (2022)A no reference method for detection of dropped video frames in live video streaming., , and . ICUFN, page 839-844. IEEE, (2016)Detection of small colon bleeding in wireless capsule endoscopy videos., , , and . Comput. Medical Imaging Graph., (2016)