Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spammer detection and fake user identification on social networks, , , , , , and . IEEE Access, (2019)Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities, , , and . Computer Science and Information Systems, 16 (1): 84--101 (2019)Performance Evaluation of Data Dissemination Protocols for Connected Autonomous Vehicles., , , , , and . IEEE Access, (2020)ELC: Edge Linked Caching for content updating in information-centric Internet of Things., , , , , and . Comput. Commun., (2020)Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography., , , and . IEEE Access, (2023)LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things., , , , , and . IEEE Internet Things J., 10 (4): 2776-2783 (February 2023)Securing IoT With Deep Federated Learning: A Trust-Based Malicious Node Identification Approach., , , , , and . IEEE Access, (2023)Machine Learning-based Mist Computing Enabled Internet of Battlefield Things., , , , , , and . ACM Trans. Internet Techn., 21 (4): 101:1-101:26 (2021)An e-Health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application., , , , , and . Future Gener. Comput. Syst., (2019)GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices., , , , and . Sensors, 22 (4): 1349 (2022)