Author of the publication

A New Generation of Wireless Sensors Networks: Wireless Body Area Networks.

, , and . WorldCIST (2), volume 570 of Advances in Intelligent Systems and Computing, page 384-393. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection., , , and . ATSIP, page 1-6. IEEE, (2017)Comparative Analysis of Datasets for Response-based Knowledge Distillation in Image Classification., and . CiSt, page 688-691. IEEE, (2023)Security Analysis of Key Binding Biometric Cryptosystems., , , and . ICISP, volume 7340 of Lecture Notes in Computer Science, page 269-281. Springer, (2012)Noisy Satellite Image Segmentation Using Statistical Features., , , and . SCA, volume 37 of Lecture Notes in Networks and Systems, page 129-135. Springer, (2017)Biometric cryptosystems based fuzzy commitment scheme: a security evaluation., , , , and . Int. Arab J. Inf. Technol., 13 (4): 443-449 (2016)Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection., , , , and . IbPRIA (1), volume 11867 of Lecture Notes in Computer Science, page 170-181. Springer, (2019)A New Generation of Wireless Sensors Networks: Wireless Body Area Networks., , and . WorldCIST (2), volume 570 of Advances in Intelligent Systems and Computing, page 384-393. Springer, (2017)M-Centrality: identifying key nodes based on global position and local degree variation., , and . CoRR, (2023)Evaluation of the Impact of Noise on Biometric Authentication Systems., , , and . ICAAI, page 188-192. ACM, (2019)Trace Attack against Biometric Mobile Applications., , , , , and . Mob. Inf. Syst., (2016)