Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Declarative Approach for Specifying User-Centric Communication., , , , and . CTS, page 89-98. IEEE Computer Society, (2006)Deep learning approach to detect malicious attacks at system level: poster., , and . WiSec, page 314-315. ACM, (2019)Efficient concurrent operations of telepresence avatars., , and . ISR, page 1-5. IEEE, (2013)KeyNet: Enhancing Cybersecurity with Deep Learning-Based LSTM on Keystroke Dynamics for Authentication., and . ICHI, volume 13184 of Lecture Notes in Computer Science, page 761-771. Springer, (2021)Image Content-Based Retrieval Using Chromaticity Moments., , and . IEEE Trans. Knowl. Data Eng., 15 (5): 1069-1072 (2003)A Novel Communication Architecture and Control System for TeleBot: A Multi-Modal Telepresence Robot for Disabled Officers., , , , , , and . IJNGC, (2016)Automatic Generation of User-Centric Multimedia Communication Services., , , and . IPCCC, page 324-331. IEEE Computer Society, (2007)Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption., , , , and . IOTSMS, page 141-148. IEEE, (2023)Optimizing Sensor Subset Selection with Quantum Annealing: A Large-Scale Indoor Temperature Regulation Application., and . IHCI (2), volume 14532 of Lecture Notes in Computer Science, page 228-237. Springer, (2023)Identifying Groups of Fake Reviewers Using a Semisupervised Approach., , , , and . IEEE Trans. Comput. Soc. Syst., 8 (6): 1369-1378 (2021)