Author of the publication

Special issue on neural computing and applications 2021.

, , , , , and . Neural Comput. Appl., 34 (19): 16169-16171 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved preimage attack against HAVAL-3., , and . Inf. Process. Lett., 115 (2): 386-393 (2015)Security Mediated Certificateless Signatures., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 459-477. Springer, (2007)Performance Analysis of an Fuzzy Logic Based LEACH Protocol., , and . ICSCA, page 33-37. ACM, (2019)Parallelizable MAC revisited., , , and . Secur. Commun. Networks, 7 (7): 1115-1127 (2014)Cryptanalysis of a CP-ABE scheme with policy in normal forms., and . Inf. Process. Lett., 116 (7): 492-495 (2016)Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System., , , , , , and . ICAIP, page 111-115. ACM, (2018)Cancellable speech template via random binary orthogonal matrices projection hashing., , , , , , and . Pattern Recognit., (2018)Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA., , , , and . IEEE Trans. Very Large Scale Integr. Syst., 28 (12): 2672-2684 (2020)Special issue on neural computing and applications 2021., , , , , and . Neural Comput. Appl., 34 (19): 16169-16171 (2022)Cryptanalysis of genetic algorithm-based encryption scheme., , , , and . Multim. Tools Appl., 79 (35-36): 25259-25276 (2020)