Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Data Confidentiality Protection in Cloud Environments., , and . Int. J. Web Serv. Res., 9 (3): 67-83 (2012)Making Smart Homes Smarter: Optimizing Energy Consumption with Human in the Loop., , and . CoRR, (2019)Empowering First Responders through Automated Multimodal Content Moderation., , , , and . ICCC, page 1-8. IEEE Computer Society, (2018)Assessing risk of attacks in large networked system with Context Sensitive Probabilistic Modelling., , and . BigMM, page 262-266. IEEE, (2020)A Study of Black Box Adversarial Attacks in Computer Vision., , , and . CoRR, (2019)An adaptable distributed trust management framework for large-scale secure service-based systems., , and . Computing, 96 (10): 925-949 (2014)Foresee: Attentive Future Projections of Chaotic Road Environments., and . AAMAS, page 2073-2075. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks., , and . TPS-ISA, page 64-72. IEEE, (2020)Understanding Coordinated Communities through the Lens of Protest-Centric Narratives: A Case Study on #CAA Protest., , , , , and . ICWSM, page 1123-1133. AAAI Press, (2024)An Adaptive Approach to Securing Ubiquitous Smart Devices in IoT Environment with Probabilistic User Behavior Prediction.. Arizona State University, Tempe, USA, (2016)base-search.net (ftarizonastateun:item:40829).