Author of the publication

Generative adversarial network based abnormal behavior detection in massive crowd videos: a Hajj case study.

, , , , , and . J. Ambient Intell. Humaniz. Comput., 13 (8): 4077-4088 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Management in Information Centric Networking. International Journal of Computer Networks & Communications (IJCNC), 5 (6): 153-166 (November 2013)An Information-Centric Networking Based Registry for Decentralized Identifiers and Verifiable Credentials.. IEEE Access, (2020)Data Fusion for Intelligent Crowd Monitoring and Management Systems: A Survey., , , , , , and . IEEE Access, (2021)Designing secure and lightweight user access to drone for smart city surveillance., , , , , and . Comput. Stand. Interfaces, (2022)AAC: Automatic Augmentation for Crowd Counting., , , , , , , and . Neurocomputing, (2022)An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks., , , , , , , and . Int. J. Distributed Sens. Networks, 16 (6): 155014772092577 (2020)A software-defined architecture for next-generation cellular networks., , , and . ICC, page 1-6. IEEE, (2016)Reinforcement Learning for Task Placement in Collaborative Cloud- Edge Computing., , , , , and . GLOBECOM, page 1-6. IEEE, (2021)Distributed access control for information-centric networking architectures using verifiable credentials., , , , and . Int. J. Inf. Sec., 22 (2): 467-478 (April 2023)Provable Privacy Preserving Authentication Solution for Internet of Things Environment., and . IEEE Access, (2021)