Author of the publication

A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments.

, , , , and . ICC, page 1-6. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generative Adversarial Networks for Change Detection in Multispectral Imagery., , , and . IEEE Geosci. Remote. Sens. Lett., 14 (12): 2310-2314 (2017)Generalized analytical expressions for end-to-end throughput of IEEE 802.11 string-topology multi-hop networks., , , , , and . Ad Hoc Networks, (2018)Machine-Learning-Based Online Distributed Denial-of-Service Attack Detection Using Spark Streaming., , , , , and . ICC, page 1-6. IEEE, (2018)A Novel Light-Weight Subjective Trust Inference Framework in MANETs., , , , , and . IEEE Trans. Sustain. Comput., 5 (2): 236-248 (2020)Feature Map Distillation of Thin Nets for Low-Resolution Object Recognition., , , , , and . IEEE Trans. Image Process., (2022)QoS Strategies for Wireless Multimedia Sensor Networks in the Context of IoT., , , and . AFRICOMM, volume 275 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 228-253. Springer, (2018)A Graph-Based Multi-hop Cooperative MIMO Scheme for Heterogeneous WSN., , , , and . CWSN, volume 334 of Communications in Computer and Information Science, page 237-247. Springer, (2012)Channel assignment for multi-interface multi-hop wireless networks., , , , and . ICTC, page 1216-1220. IEEE, (2016)Adversarial Learning of Transitive Semantic Features for Cross-Domain Recommendation., , , and . GLOBECOM, page 1-6. IEEE, (2019)AnomalyLLM: Few-shot Anomaly Edge Detection for Dynamic Graphs using Large Language Models., , , , , , , and . CoRR, (2024)