Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Examples for CNN-Based Malware Detectors., , , , and . IEEE Access, (2019)A Matching Framework for Employees to Support Carpooling in the Context of Large Companies., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (2): 1159-1170 (2022)CLARA: citation and similarity-based author ranking., , , , and . Scientometrics, 128 (2): 1091-1117 (February 2023)A hybrid genetic algorithm for machine-part grouping., , and . Comput. Ind. Eng., 56 (1): 347-356 (2009)Impact of random defective rate on lot size focusing work-in-process inventory in manufacturing system., , , , and . Int. J. Prod. Res., 55 (6): 1748-1766 (2017)End-to-end malware detection for android IoT devices using deep learning., , , , and . Ad Hoc Networks, (2020)Personal Knowledge Abilities and Knowledge Management Success., , and . J. Inf. Knowl. Manag., 9 (4): 319-327 (2010)The Impact of Knowledge Sharing Enablers on Employees' Performance: An Empirical Study on READ Foundation in Azad Jammu & Kashmir., , , , and . J. Inf. Knowl. Manag., 14 (3): 1550020:1-1550020:13 (2015)A negotiation model of individual matching and zonal-based travel behavior in carpooling., , , and . Pers. Ubiquitous Comput., 27 (5): 1757-1777 (October 2023)Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework., , , , , , and . Comput. Intell. Neurosci., (2022)