Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks., , and . SN Comput. Sci., 2 (5): 383 (2021)Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review., , , , and . IT Prof., 23 (5): 50-55 (2021)Adversarial Attacks and Defenses for Deployed AI Models., and . IT Prof., 24 (4): 37-41 (2022)Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks., , and . CoRR, (2020)Transfer learning and Local interpretable model agnostic based visual approach in Monkeypox Disease Detection and Classification: A Deep Learning insights., , , , , , and . CoRR, (2022)A survey of blockchain from security perspective., , and . J. Bank. Financial Technol., 3 (1): 1-17 (2019)An Online Unsupervised Streaming Features Selection Through Dynamic Feature Clustering., , , , and . IEEE Trans. Artif. Intell., 4 (5): 1281-1292 (October 2023)Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection., , , , , , , , and . COMPSAC, page 1057-1063. IEEE, (2023)HeteroGenius: An Improvised 'Intelligence' in Heterogeneous Graph Transformers., , , and . ICMLA, page 849-854. IEEE, (2022)A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and Localization., , , , , , and . CCWC, page 1137-1144. IEEE, (2023)