Author of the publication

Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19.

, and . Multim. Tools Appl., 80 (14): 21899-21923 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRYPTANALYSIS OF KEY EXCHANGE METHOD USING COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER PERCEPTRON IN WIRELESS COMMUNICATION (CKEMLP), and . Advanced Computational Intelligence: An International Journal (ACII), 1 (1): 01-09 (July 2014)Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence., , , and . IEEE Access, (2024)Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats., , , , and . Internet Things, (2024)CRYPTANALYSIS OF KEY EXCHANGE METHOD USING COMPUTATIONAL INTELLIGENCE GUIDED MULTILAYER PERCEPTRON IN WIRELESS COMMUNICATION. Advanced Computational Intelligence: An International Journal (ACII), 1 (1): 01-09 (July 2014)Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19., and . Multim. Tools Appl., 80 (14): 21899-21923 (2021)KSOFM Network Based Neural Key Generation for Wireless Communication., , , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 207-215. Springer, (2014)Graph Representation Learning via Ladder Gamma Variational Autoencoders., , and . AAAI, page 5604-5611. AAAI Press, (2020)DAM: Deadblock Aware Migration Techniques for STT-RAM-Based Hybrid Caches., , , and . IEEE Comput. Archit. Lett., 20 (1): 62-65 (2021)Neuro-key Generation Based on HEBB Network for Wireless Communication., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 197-205. Springer, (2014)Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in Industrial Internet of Things., , and . Eng. Appl. Artif. Intell., 123 (Part B): 106357 (2023)