Author of the publication

A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G.

, , , , and . IEEE Trans. Veh. Technol., 70 (6): 5234-5243 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grid and Workflows., and . Encyclopedia of Database Systems, Springer US, (2009)A Probabilistic Strategy for Setting Temporal Constraints in Scientific Workflows., , and . BPM, volume 5240 of Lecture Notes in Computer Science, page 180-195. Springer, (2008)A Tensor-Based Forensics Framework for Virtualized Network Functions in the Internet of Things: Utilizing Tensor Algebra in Facilitating More Efficient Network Forensic Investigations., , , , , and . IEEE Consumer Electronics Magazine, 8 (3): 23-27 (2019)Research trends in cloud, cluster and grid computing., , and . Clust. Comput., 16 (3): 335-337 (2013)A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud., and . IEEE Trans. Knowl. Data Eng., 29 (6): 1144-1157 (2017)Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid., , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5724-5737 (June 2023)Bounded and Unbiased Composite Differential Privacy., , , , , , , and . CoRR, (2023)Differentially Private Enhanced Permissioned Blockchain for Private Data Sharing in Industrial IoT., , and . CoRR, (2022)Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey., , , and . CoRR, (2021)A many-objective evolutionary algorithm assisted by ideal hyperplane., , , , , and . Swarm Evol. Comput., (February 2024)