Author of the publication

A Hybrid Algorithm for Image Watermarking against Signal Processing Attacks.

, , and . MIWAI, volume 8271 of Lecture Notes in Computer Science, page 235-246. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics., and . Wirel. Pers. Commun., 122 (3): 2701-2722 (2022)SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs., , and . Wirel. Pers. Commun., 113 (1): 1-15 (2020)Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking., , and . Wirel. Pers. Commun., 118 (4): 2295-2317 (2021)Analysis, Detection, and Classification of Android Malware using System Calls., and . CoRR, (2022)Manual Prompt Generation For Language Model Probing., , , and . LM-KBC@ISWC, volume 3274 of CEUR Workshop Proceedings, page 67-76. CEUR-WS.org, (2022)Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning., , , and . SAI (3), volume 1230 of Advances in Intelligent Systems and Computing, page 161-173. Springer, (2020)An attack resistant key predistribution scheme for wireless sensor networks., and . J. King Saud Univ. Comput. Inf. Sci., 33 (3): 268-280 (2021)Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks., , and . Wirel. Pers. Commun., 89 (2): 687-707 (2016)Weighted load balanced routing protocol for MANET., and . ICON, page 1-6. IEEE, (2008)Semantic approach for Web service classification using machine learning and measures of semantic relatedness., , and . Serv. Oriented Comput. Appl., 10 (3): 221-231 (2016)