Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SRAM hardware Trojan., and . IST, page 719-722. IEEE, (2016)Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors., , and . ISeCure, 11 (2): 159-171 (2019)Real-Time Pedestrian Detection Using Enhanced Representations from Light-Weight YOLO Network., , , , and . CoDIT, page 1524-1529. IEEE, (2022)Sensing Structure for Blind Spot Detection System in Vehicles., , , and . ICCAIS, page 1-6. IEEE, (2019)Selfish node detection based on hierarchical game theory in IoT., , , and . EURASIP J. Wireless Comm. and Networking, (2019)Pedestrian Detection Using Image Fusion and Stereo Vision in Autonomous Vehicles., , and . IST, page 592-596. IEEE, (2018)Blind Spot Detection System in Vehicles Using Fusion of Radar Detections and Camera Verification., , , and . Int. J. Intell. Transp. Syst. Res., 19 (2): 389-404 (2021)A Game Theory Approach for Malicious Node Detection in MANETs., , and . J. Inf. Sci. Eng., 32 (3): 559-573 (2016)Security Framework of IoT-Based Smart Home., , and . IST, page 251-256. IEEE, (2020)Security operation center implementation on OpenStack., and . IST, page 766-770. IEEE, (2016)