Author of the publication

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network.

, , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Welcome message from FINGNet-2012 international workshop organizers, , , , and . Proceedings-6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, (2012)Welcome message from FINGNet-2013 international workshop organizers, , , , and . Proceedings-7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, page 51. (2013)A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service., , and . Wireless Personal Communications, 97 (1): 1-17 (2017)Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network., , and . HPCC, volume 4208 of Lecture Notes in Computer Science, page 280-289. Springer, (2006)Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS., , and . ICACT, page 63-67. IEEE, (2018)Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks., , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 440-447. Springer, (2006)Securing information flow in content delivery networks with visual and quantum cryptography., , and . ICOIN, page 463-468. IEEE Computer Society, (2016)Data aggregation using temporal and spatial correlations in Advanced Metering Infrastructure., and . ICOIN, page 541-544. IEEE Computer Society, (2014)Performance evaluation of FDDI network and interconnected heterogeneous networks., and . LCN, page 75-83. IEEE Computer Society, (1990)Authentication for Mobile Open IPTV Service Security., , and . IMIS, page 381-385. IEEE Computer Society, (2016)