Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Doodle-Based Authentication Technique Using Augmented Reality, , , , and . IEEE Access, (2020)Spammer Detection and Fake User Identification on Social Networks., , , , , , , and . IEEE Access, (2019)Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer approach., , , , , , , and . Concurr. Comput. Pract. Exp., 27 (10): 2637-2655 (2015)Autonomic computation offloading in mobile edge for IoT applications., , , , and . Future Gener. Comput. Syst., (2019)A key distribution scheme for secure communication in acoustic sensor networks., , , , , , and . Future Gener. Comput. Syst., (2018)Exploiting pretrained CNN models for the development of an EEG-based robust BCI framework., , , , , and . Comput. Biol. Medicine, (2022)Leveraging Blockchain Technology for Secure Energy Trading and Least-Cost Evaluation of Decentralized Contributions to Electrification in Sub-Saharan Africa., , , , , and . Entropy, 22 (2): 226 (2020)Machine Learning-Based Detection of Spam Emails., , , , , and . Sci. Program., (2021)An Efficient Skewed Line Segmentation Technique for Cursive Script OCR., , , , , , and . Sci. Program., (2020)Inferring Ties in Social IoT Using Location-Based Networks and Identification of Hidden Suspicious Ties., , , , , and . Sci. Program., (2020)