Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lecture video indexing using boosted margin maximizing neural networks., , , and . CoRR, (2017)Lecture Vdeo Indexing Using Boosted Margin Maximizing Neural Networks., , , and . ICMLA, page 221-227. IEEE, (2017)Wireless medical implant: A case study on artificial pancreas., , , , , and . ICC, page 6096-6100. IEEE, (2012)CGMOS: Certainty Guided Minority OverSampling., , , , and . CIKM, page 1623-1631. ACM, (2016)A Physical and SPICE-Compatible Model for the MOS Depletion Device.. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 4 (3): 349-356 (1985)A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks., , , , and . IEEE Access, (2020)Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens., , , and . IEEE Trans. Reliability, 68 (4): 1330-1346 (2019)Efficient and secure encryption schemes for JPEG2000., and . ICASSP (5), page 869-872. IEEE, (2004)Simplified Local Internet Number Resource Management with the RPKI (SLURM)., , and . RFC, (August 2018)Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing., , , , , and . IEEE Internet Things J., 11 (2): 1893-1909 (January 2024)