Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario., , , and . IEEE Trans. Veh. Technol., 69 (12): 14188-14197 (2020)Deep3DSCan: Deep residual network and morphological descriptor based framework for lung cancer classification and 3D segmentation., , , , and . IET Image Process., 14 (7): 1240-1247 (2020)An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions., , , , and . CoRR, (2022)Securing the Internet of Vehicles: A Deep Learning-Based Classification Framework., , , and . IEEE Netw. Lett., 3 (2): 94-97 (2021)Uniting cyber security and machine learning: Advantages, challenges and future research., , , and . ICT Express, 8 (3): 313-321 (2022)SCAN-GAN: Generative Adversarial Network Based Synthetic Data Generation Technique for Controller Area Network., , and . IEEE Internet Things Mag., 6 (3): 126-130 (September 2023)Deep Learning Enhanced UAV Imagery for Critical Infrastructure Protection., , , , and . IEEE Internet Things Mag., 5 (2): 30-34 (2022)Guest Editorial: Internet of Drones: Novel Applications, Recent Deployments, and Integration., , , , and . IEEE Internet Things Mag., 4 (4): 8-10 (2021)A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures., , , , , and . IEEE Access, (2019)A Review of Trustworthy and Explainable Artificial Intelligence (XAI)., , , , , and . IEEE Access, (2023)