Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles., , and . e-Energy, page 468-470. ACM, (2018)Few notes towards making honeyword system more secure and usable., and . SIN, page 237-245. ACM, (2015)SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones., , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 129-145. Springer, (2018)Tag Digit Based Honeypot to Detect Shoulder Surfing Attack., and . SSCC, volume 467 of Communications in Computer and Information Science, page 101-110. Springer, (2014)Subdomain adaptation via correlation alignment with entropy minimization for unsupervised domain adaptation., , , and . Pattern Anal. Appl., 27 (1): 13 (March 2024)Vision Transformer-Based Federated Learning for COVID-19 Detection Using Chest X-Ray., , , , and . ICONIP (7), volume 1794 of Communications in Computer and Information Science, page 77-88. Springer, (2022)Vision Transformer Based COVID-19 Detection Using Chest CT-scan images., , , and . BHI, page 1-4. IEEE, (2022)On Validation of Clustering Techniques for Bibliographic Databases., , and . ICPR, page 3150-3155. IEEE Computer Society, (2014)Supporting Negative Authorization in Spatiotemporal Role Based Access Control., and . NetCoM, page 422-427. IEEE Computer Society, (2009)An Automated Policy Verification and Enforcement Framework for Ethereum Applications., , and . ICBC, page 1-5. IEEE, (2023)