Author of the publication

Personal Mobility in Metaverse With Autonomous Vehicles Using Q-Rung Orthopair Fuzzy Sets Based OPA-RAFSI Model.

, , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 15642-15651 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Deep Active Learning, , , , , , , and . ACM Computing Surveys, 54 (9): 1--40 (December 2022)Medical Image Forgery Detection for Smart Healthcare., , , and . IEEE Commun. Mag., 56 (4): 33-37 (2018)Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol., , , , , , and . IEEE Access, (2018)Risk transfer mechanism to defend DDoS attacks in IoT scenario., , and . ISCE, page 37-40. IEEE, (2017)Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment., , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 14-23. Springer, (2023)The early detection of malicious communication with DNS traffic through the use of simple features., , , and . GCCE, page 291-293. IEEE, (2021)Fuzzy Based Clustering of Consumers' Big Data in Industrial Applications., , , , , , , and . ICCE, page 1-3. IEEE, (2023)Autoencoders Based Optimized Deep Learning Model for the Detection of Cyber Attack in IoT Environment., , , , and . ICCE, page 1-6. IEEE, (2024)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet Things J., 6 (2): 1402-1409 (2019)Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning Environment., , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 378-385. Springer, (2020)