Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Doodle-Based Authentication Technique Using Augmented Reality, , , , and . IEEE Access, (2020)Spammer Detection and Fake User Identification on Social Networks., , , , , , , and . IEEE Access, (2019)Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks., , , , , and . IEEE Access, (2019)Tradeoff Between Sensing Quality and Network Lifetime for Heterogeneous Target Coverage Using Directional Sensor Nodes., , , , , and . IEEE Access, (2017)NeuroTrust - Artificial-Neural-Network-Based Intelligent Trust Management Mechanism for Large-Scale Internet of Medical Things., , , , , and . IEEE Internet Things J., 8 (21): 15672-15682 (2021)BIoTHR: Electronic Health Record Servicing Scheme in IoT-Blockchain Ecosystem., , , and . IEEE Internet Things J., 8 (13): 10857-10872 (2021)Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer approach., , , , , , , and . Concurr. Comput. Pract. Exp., 27 (10): 2637-2655 (2015)Investigating Tree Family Machine Learning Techniques for a Predictive System to Unveil Software Defects., , , , , , and . Complex., (2020)A Two-Stage Privacy Preservation and Secure Peer-to-Peer Energy Trading Model Using Blockchain and Cloud-Based Aggregator., , , , , and . IEEE Access, (2021)Systematic Literature Review on IoT-Based Botnet Attack., , , , , , and . IEEE Access, (2020)