Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol., , , and . IEEE Open J. Comput. Soc., (2022)Designing Constraint-Based False Data-Injection Attacks Against the Unbalanced Distribution Smart Grids., , , and . IEEE Internet Things J., 8 (11): 9422-9435 (2021)Designing false data injection attacks penetrating AC-based bad data detection system and FDI dataset generation., , , , and . Concurr. Comput. Pract. Exp., (2022)A Multi-Filter Fingerprint Matching Framework for Cancelable Template Design., and . IEEE Trans. Inf. Forensics Secur., (2021)Learning Natural Thresholds for Image Ranking., , and . ICPR, page 8368-8375. IEEE, (2020)Clustering for point pattern data., , , and . ICPR, page 3174-3179. IEEE, (2016)Biometrics and Privacy-Preservation: How Do They Evolve?, , and . IEEE Open J. Comput. Soc., (2021)Downlink Resource Sharing and Multi-tier Caching Selection Maximized Multicast Video Delivery Capacity in 5G Ultra-Dense Networks., , , , , and . INISCOM, volume 334 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 19-31. Springer, (2020)Designing False Data Injection attacks penetrating AC-based Bad Data Detection System and FDI Dataset generation., , , , and . CoRR, (2020)Measuring Sample Efficiency and Generalization in Reinforcement Learning Benchmarks: NeurIPS 2020 Procgen Benchmark., , , , , , , , , and 13 other author(s). CoRR, (2021)