Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing app distribution process of iOS exploiting the notion of authentic update., , and . NSysS, page 1-8. IEEE, (2016)A Tale of a Deep Learning Approach to Image Forgery Detection., and . NSysS, page 102-110. IEEE, (2018)iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks., and . Wireless Networks, 21 (2): 581-610 (2015)Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks., , , and . ICCCN, page 1-8. IEEE, (2011)Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics., , , , , , , and . NSysS, page 87-95. IEEE, (2017)Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics., , , , and . MobiQuitous, page 322-331. ACM, (2018)Fault-tolerant design method for tizen applications considering core- and API-level faults., and . NSysS, page 116-121. ACM, (2019)Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks., , , and . Wirel. Sens. Netw., 2 (7): 538-554 (2010)An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh., , , , , and . CoRR, (2020)Leveraging a Smartwatch for Activity Recognition in Salat., , , , and . IEEE Access, (2023)