Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks., and . Sensors, 23 (9): 4407 (2023)Control Flow Integrity Based on Lightweight Encryption Architecture., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (7): 1358-1369 (2018)Modified genetic algorithm-based feature selection combined with pre-trained deep neural network for demand forecasting in outpatient department., , , , and . Expert Syst. Appl., (2017)Interpretable Multimodal Fusion Networks Reveal Mechanisms of Brain Cognition., , , , , , , , , and 1 other author(s). IEEE Trans. Medical Imaging, 40 (5): 1474-1483 (2021)Energy efficient implementation of G.729 for wireless VoIP application., , , and . ICAIT, page 133:1-133:7. ACM, (2008)FADER: False alarm detection and recovery for trust-aware routing in wireless sensor networks., and . ICCVE, page 647-648. IEEE, (2013)Phenotype guided interpretable graph convolutional network analysis of fMRI data reveals changing brain connectivity during adolescence., , and . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, volume 12036 of SPIE Proceedings, SPIE, (2022)Processor Vulnerability Discovery., , and . DAC, page 1-3. IEEE, (2023)Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation., , , , , and . ASP-DAC, page 157-162. IEEE, (2020)Satisfiability Don't Care condition based circuit fingerprinting techniques., and . ASP-DAC, page 815-820. IEEE, (2015)