Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The artificial intelligence technologies in Industry 4.0: A taxonomy, approaches, and future directions., , , and . Comput. Ind. Eng., (November 2023)Robust Data Hiding in Multimedia for Authentication and Ownership Protection.. University of California, Irvine, USA, (2017)base-search.net (ftcdlib:qt4876r8bs).A novel fuzzy trust-based secure routing scheme in flying ad hoc networks., , , , , , , , and . Veh. Commun., (December 2023)Optimal Adaptive Super-Twisting Sliding-Mode Control Using Online Actor-Critic Neural Networks for Permanent-Magnet Synchronous Motor Drives., and . IEEE Access, (2021)Weighted Constraint Feature Selection of Local Descriptor for Texture Image Classification., , , , and . IEEE Access, (2023)Fuzzy Swin transformer for Land Use/ Land Cover change detection using LISS-III Satellite data., , , and . Earth Sci. Informatics, 17 (2): 1745-1764 (April 2024)A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication., , and . Multim. Tools Appl., 82 (28): 43367-43419 (November 2023)Hybrid pyramid-DWT-SVD dual data hiding technique for videos ownership protection., , , and . Multim. Tools Appl., 78 (11): 14511-14547 (2019)3D mesh robust watermarking technique for ownership protection., , and . ACSSC, page 217-222. IEEE, (2017)DWT-based watermarking technique for video authentication., , , and . ICECS, page 41-44. IEEE, (2015)