Author of the publication

Suspicious Activity Recognition Using Proposed Deep L4-Branched-Actionnet With Entropy Coded Ant Colony System Optimization.

, , , , , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity., , , and . IWCMC, page 394-399. IEEE, (2018)Whisper in Focus: Enhancing Stuttered Speech Classification with Encoder Layer Optimization., , , and . CoRR, (2023)CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks., , , and . IEEE Access, (2023)Behavioral Based Insider Threat Detection Using Deep Learning., , , and . IEEE Access, (2021)RiceChain: secure and traceable rice supply chain framework using blockchain technology., , , , and . PeerJ Comput. Sci., (2022)Analytical study of hardware-rooted security standards and their implementation techniques in mobile., , , , and . Telecommun. Syst., 74 (3): 379-403 (2020)Crowdsourcing Cybercrimes through Online Resources., , , and . DeSE, page 158-163. IEEE, (2020)Malicious Insider Attack Detection in IoTs Using Data Analytics., , , , , and . IEEE Access, (2020)Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols., , , , , and . IEEE Access, (2020)A novel cloud management framework for trust establishment and evaluation in a federated cloud environment., , and . J. Supercomput., 77 (11): 12537-12560 (2021)