Author of the publication

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FOCAN: A Fog-supported Smart City Network Architecture for Management of Applications in the Internet of Everything Environments., , , , and . CoRR, (2017)A new Stable Election-based routing algorithm to preserve aliveness and energy in fog-supported wireless sensor networks., , , and . SMC, page 2413-2418. IEEE, (2016)Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN., , , , , and . Comput. Networks, (2019)Forward Privacy Preservation in IoT-Enabled Healthcare Systems., , , , , and . IEEE Trans. Ind. Informatics, 18 (3): 1991-1999 (2022)SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things., , , , and . IEEE Trans. Ind. Informatics, 18 (9): 6424-6434 (2022)IRATS: A DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network., , , and . Ad Hoc Networks, (March 2023)Energy-saving self-configuring networked data centers., , and . Comput. Networks, 57 (17): 3479-3491 (2013)Poisoning Bearer Context Migration in O-RAN 5G Network., , , , and . IEEE Wirel. Commun. Lett., 12 (3): 401-405 (March 2023)Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 13108-13122 (November 2023)Closed-loop and open-loop authentication protocols for blockchain-based IoT systems., , , , and . Inf. Process. Manag., 58 (4): 102568 (2021)