Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Machine Learning-Based Security Vulnerability Study on XOR PUFs for Resource-Constraint Internet of Things., , and . ICIOT, page 49-56. IEEE Computer Society, (2018)Towards fast and accurate machine learning attacks of feed-forward arbiter PUFs., and . DSC, page 181-187. IEEE, (2017)Context-Aware Autonomous Security Assertion for Industrial IoT., , , and . IEEE Access, (2020)Automatic identification of sarcasm in tweets and customer reviews., , , , , , and . J. Intell. Fuzzy Syst., 37 (5): 6815-6828 (2019)Big Data Dimensionality Reduction for Wireless Sensor Networks Using Stacked Autoencoders., , , , , and . RIIFORUM, page 391-400. Springer, (2019)Examination of Double Arbiter PUFs on Security against Machine Learning Attacks., , , and . IEEE BigData, page 3165-3171. IEEE, (2019)Analysis of Eyebrow Motion for Micro-Expression Recognition., , and . ICIGP, page 109-116. ACM, (2022)Emerging Computer Vision Based Machine Learning Issues for Smart Cities., , , , and . RIIFORUM, page 315-322. Springer, (2019)LaHiIO: Accelerating Persistent Big Data Machine Learning via Latency Hiding IOs., , , and . IEEE BigData, page 2063-2070. IEEE, (2018)Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices., , , and . PST, page 1-9. IEEE, (2019)