Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Attacks and Defenses for Deployed AI Models., and . IT Prof., 24 (4): 37-41 (2022)Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review., , , , and . IT Prof., 23 (5): 50-55 (2021)Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks., , and . SN Comput. Sci., 2 (5): 383 (2021)A survey of blockchain from security perspective., , and . J. Bank. Financial Technol., 3 (1): 1-17 (2019)Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks., , and . CoRR, (2020)HeteroGenius: An Improvised 'Intelligence' in Heterogeneous Graph Transformers., , , and . ICMLA, page 849-854. IEEE, (2022)An Online Unsupervised Streaming Features Selection Through Dynamic Feature Clustering., , , , and . IEEE Trans. Artif. Intell., 4 (5): 1281-1292 (October 2023)Transfer learning and Local interpretable model agnostic based visual approach in Monkeypox Disease Detection and Classification: A Deep Learning insights., , , , , , and . CoRR, (2022)A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and Localization., , , , , , and . CCWC, page 1137-1144. IEEE, (2023)Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection., , , , , , , , and . COMPSAC, page 1057-1063. IEEE, (2023)