Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map., , , , , , and . Multim. Tools Appl., 81 (21): 30931-30959 (2022)A game theory approach for smart traffic management., , , and . Comput. Electr. Eng., (September 2023)A Hybrid Privacy-Preserving Deep Learning Approach for Object Classification in Very High-Resolution Satellite Images., , , , , and . Remote. Sens., 14 (18): 4631 (2022)Intelligent Scheduling Algorithms for the Enhancement of Drone-Based Innovative Logistic Supply Chain Systems., , , , , and . IEEE Access, (2023)Efficient Storage Approach for Big Data Analytics: An Iterative-Probabilistic Method for Dynamic Resource Allocation of Big Satellite Images., , , and . IEEE Access, (2023)Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution., , , , , , , and . IEEE Access, (2020)Fusion of convolutional neural networks based on Dempster-Shafer theory for automatic pneumonia detection from chest X-ray images., , , , and . Int. J. Imaging Syst. Technol., 32 (2): 658-672 (2022)Intrusion Detection using Machine Learning Techniques: An Experimental Comparison., , , , , , , and . CoRR, (2021)Evolution of Target Localization in Wireless Sensor Network (WSN): A Review., , , , and . CoRR, (2021)A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids., , , , and . Entropy, 21 (11): 1132 (2019)