Author of the publication

An efficient Trust Related Attack Detection Model based on Machine Learning for Social Internet of Things.

, , , and . IWCMC, page 1465-1470. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PSO-Based Adaptive Hierarchical Interval Type-2 Fuzzy Knowledge Representation System (PSO-AHIT2FKRS) for Travel Route Guidance., , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (2): 804-818 (2022)Interval type-2 Beta Fuzzy Near set based approach to content based image retrieval., , , , and . CoRR, (2018)Multi-agent based intuitionistic fuzzy logic healthcare decision support system., , and . J. Intell. Fuzzy Syst., 37 (2): 2697-2712 (2019)A New Neural Networks-Based Integrated Model for Aspect Extraction and Sentiment Classification., , and . Int. J. Multim. Data Eng. Manag., 12 (4): 52-71 (2021)Neural Network Pruning Based on Improved Constrained Particle Swarm Optimization., , and . ICONIP (6), volume 1517 of Communications in Computer and Information Science, page 315-322. Springer, (2021)Res_1D_CNN and BiLSTM with Attention Mechanism Integration for Arrhythmia Diagnosis., , and . ICCCI (CCIS Volume), volume 1864 of Communications in Computer and Information Science, page 753-764. Springer, (2023)An efficient Trust Related Attack Detection Model based on Machine Learning for Social Internet of Things., , , and . IWCMC, page 1465-1470. IEEE, (2021)Risk Prediction in Smart Home Care., , and . AINA, page 866-873. IEEE Computer Society, (2018)Modeling a secure cloud data warehouse with SoaML., , and . IAS, page 55-60. IEEE, (2015)A survey of data warehouse security., , and . Ingénierie des Systèmes d Inf., 19 (5): 75-96 (2014)