Author of the publication

Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Physical Trust Systems Driven by Blockchain., , and . IEEE Access, (2020)Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research., , , , , , and . IEEE Open J. Commun. Soc., (2021)Badminton match outcome prediction model using Naïve Bayes and Feature Weighting technique., , , and . J. Ambient Intell. Humaniz. Comput., 12 (8): 8441-8455 (2021)Meta Deep Learn Leaf Disease Identification Model for Cotton Crop., , and . Comput., 11 (7): 102 (2022)On Protecting IJTAG using an Inherently Secure SIB., , , , and . VLSI-SoC, page 1-6. IEEE, (2023)3-D Shape Reconstruction Based CT Image Enhancement., and . Handbook of Multimedia Information Security, Springer, (2019)Wavelet Packet Based CT Image Denoising Using Bilateral Method and Bayes Shrinkage Rule., and . Handbook of Multimedia Information Security, Springer, (2019)Development of Hindi-Punjabi parallel corpus using existing Hindi-Punjabi machine translation system., and . IITM, page 114-118. ACM, (2010)A CNN-SVM hybrid model for the classification of thyroid nodules in medical ultrasound images., and . Int. J. Grid Util. Comput., 13 (6): 624-639 (2022)A hybrid framework for time series trends: embedding social network's sentiments and optimized stacked LSTM using evolutionary algorithm., and . Multim. Tools Appl., 83 (12): 34691-34714 (April 2024)