Author of the publication

Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio.

, , , , , and . VTC2023-Spring, page 1-6. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Relationship Analysis Using State-of-the-art Embeddings., , , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (5): 138:1-138:21 (May 2023)Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks., , , , and . Comput. Commun., (2022)An Efficient Deep Learning Framework for Distracted Driver Detection., , , , , and . IEEE Access, (2021)A novel category detection of social media reviews in the restaurant industry., , , and . Multim. Syst., 29 (3): 1825-1838 (June 2023)SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning., , , , , and . IEEE Access, (2021)Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-Based Optimization Algorithm., , , , , , , and . J. Circuits Syst. Comput., 31 (1): 2250010:1-2250010:19 (2022)Parkinson's Disease Management via Wearable Sensors: A Systematic Review., , , , and . IEEE Access, (2022)ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning., , , , , and . IEEE Access, (2021)A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions., , , , , and . IEEE Access, (2022)Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy., , , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 4785-4794 (2023)