Author of the publication

Security and Privacy in Shared HitLCPS Using a GA-Based Multiple-Threshold Sanitization Model.

, , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (1): 16-25 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems., , , , , , and . J. Cloud Comput., 12 (1): 38 (December 2023)The Emergence of Heterogeneous Networks.. Adv. Artif. Intell. Mach. Learn., 2 (3): 469-470 (2022)A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder., , , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3s): 128:1-128:21 (2023)Ensemble-based deep meta learning for medical image segmentation., , and . J. Intell. Fuzzy Syst., 42 (5): 4307-4313 (2022)Security and privacy of UAV data using blockchain technology., , , , and . J. Inf. Secur. Appl., (2020)A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment., , , , , and . Veh. Commun., (February 2023)Antecedents of E-Marketing of Agriculture Products in This Digital Era: An Empirical Study.. Int. J. Technol. Hum. Interact., 18 (7): 1-17 (2022)Fake Review Classification Using Supervised Machine Learning., , , , , and . ICPR Workshops (4), volume 12664 of Lecture Notes in Computer Science, page 269-288. Springer, (2020)A Machine Learning Driven Threat Intelligence System for Malicious URL Detection., , , , and . ARES, page 154:1-154:7. ACM, (2021)AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint., , , , , , and . ICC, page 1-6. IEEE, (2022)