Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

T-PAAD: Trajectory Privacy Attack on Autonomous Driving., , , , and . CNS, page 1-2. IEEE, (2018)RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform., , , , , , and . EIT, page 892-897. IEEE, (2018)DCentroid: Location Privacy-Preserving Scheme in Spatial Crowdsourcing., , , , and . CCWC, page 715-720. IEEE, (2019)Protecting Location Privacy for Crowd Workers in Spatial Crowdsourcing Using a Novel Dummy-Based Mechanism., , , , , and . IEEE Access, (2020)FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities., , , , , and . UEMCON, page 515-522. IEEE, (2019)TASC: Efficient Task Assignment in Spatial Crowdsourcing with Workers Privacy Protection., , , , , and . EIT, page 546-550. IEEE, (2020)Location Privacy Challenges in Spatial Crowdsourcing., , , , , , , and . EIT, page 564-569. IEEE, (2018)AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning., , , , , and . CCWC, page 305-310. IEEE, (2019)A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT Protocol., , , , , and . ICISDM, page 165-170. ACM, (2019)Forged Video Detection Using Deep Learning: A SLR., , , and . Appl. Comput. Intell. Soft Comput., (2023)