Author of the publication

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security.

, and . Multim. Tools Appl., 78 (13): 17973-17994 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast and efficient hash function based on generalized chaotic mapping with variable parameters., , and . Neural Comput. Appl., 28 (6): 1405-1415 (2017)A distributed EMDN-GRU model on Spark for passenger waiting time forecasting., , , , , , and . Neural Comput. Appl., 34 (21): 19035-19050 (2022)A parallel NAW-DBLSTM algorithm on Spark for traffic flow forecasting., , , , , , and . Neural Comput. Appl., 34 (2): 1557-1575 (2022)Using Feature Fusion Strategies in Continuous Authentication on Smartphones., , , and . IEEE Internet Comput., 24 (2): 49-56 (2020)A parallel grid-search-based SVM optimization algorithm on Spark for passenger hotspot prediction., , , , , , and . Multim. Tools Appl., 81 (19): 27523-27549 (2022)An event-triggering algorithm for decentralized stochastic optimization over networks., , , , and . J. Frankl. Inst., 360 (13): 9329-9354 (September 2023)Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Dependency-aware Task Offloading via End-Edge-Cloud Cooperation in Heterogeneous Vehicular Networks., , , , , and . ITSC, page 1420-1426. IEEE, (2022)Find and Dig: A Privacy-Preserving Image Processing Mechanism in Deep Neural Networks for Mobile Computation., , , , and . IJCNN, page 1-8. IEEE, (2021)A note on non-existence of cubic semisymmetric graphs of order 8p or 8p2., , and . Ars Comb., (2017)