Author of the publication

Research Challenges and Security Threats to AI-Driven 5G Virtual Emotion Applications Using Autonomous Vehicles, Drones, and Smart Devices.

, , , , and . IEEE Netw., 34 (6): 288-294 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive search., , , , , and . MILCOM, page 1021-1026. IEEE, (2015)Conditional privacy preserving security protocol for NFC applications., , , , and . ICCE, page 380-381. IEEE, (2012)Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection., , , , , and . Sensors, 17 (6): 1360 (2017)PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability., , , , , , and . Wirel. Commun. Mob. Comput., (2017)Leveraging Smart Contracts for Asynchronous Group Key Agreement in Internet of Things., , , , , and . SMC, page 70-75. IEEE, (2020)Towards Achieving Anonymity in LBS: A Cloud Based Untrusted Middleware., , , , and . CloudCom (2), page 262-265. IEEE Computer Society, (2013)978-0-7695-5095-4.Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*., , , , , and . ICNC, page 159-163. IEEE, (2019)Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds., , , , , , and . IEEE Internet Things J., 5 (4): 2441-2448 (2018)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , and . MILCOM, page 1242-1247. IEEE, (2015)Two new multi-path routing algorithms for fault-tolerant communications in smart grid., , , , , and . Ad Hoc Networks, (2014)