Author of the publication

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.

, , , , , and . Comput. J., 61 (4): 526-538 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Enhance of Anonymous Signcryption Scheme., , , and . IACR Cryptology ePrint Archive, (2009)A Robust Fuzzy Extractor without ECCs., , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 60-68. Springer, (2012)Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments., , , , and . IEEE Syst. J., 11 (2): 1018-1026 (2017)PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism., and . Wirel. Commun. Mob. Comput., (2020)ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances.. Fundam. Informaticae, 157 (1-2): 1-27 (2018)Reliable Homomorphic Matrix Disguising Scheme., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 666-675. Springer, (2017)Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks., , , , , and . IEEE Internet Things J., 11 (4): 6664-6676 (February 2024)An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET., , , , , and . IEEE Internet Things J., 10 (24): 22823-22835 (December 2023)Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange., , , and . Int. J. Netw. Secur., 21 (5): 861-871 (2019)Ordered Semiring-based Trust Establish Model with Risk Evaluating., , , and . Int. J. Netw. Secur., 8 (2): 101-106 (2009)