Author of the publication

Pose-Based Identification Using Deep Learning for Military Surveillance Systems.

, , , and . ICTC, page 626-629. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A communication network with high safety, maintainability, and user convenience for digital I and C systems of nuclear power plants., , , , , , , and . ETFA (1), page 353-358. IEEE, (2001)Light Space The Stone.. SIGGRAPH ASIA Art Gallery, page 24:1. ACM, (2011)Two-Stage Classification Technique for Malicious DNS Identification., , , and . ICAIIC, page 68-72. IEEE, (2021)Novel hyper-tuned ensemble Random Forest algorithm for the detection of false basic safety messages in Internet of Vehicles., , , and . ICT Express, 9 (1): 122-129 (February 2023)Enhanced Vulnerability Detection in SCADA Systems using Hyper-Parameter-Tuned Ensemble Learning., , , , and . ICTC, page 458-461. IEEE, (2021)The Design of The Emerging 5G Using Hybrid GPON and XGS-PON Technology., , , , and . ICTC, page 1002-1004. IEEE, (2021)3DFed: A Secure Federated Learning-based System for Fault Detection in 3D Printer Industry., , , , and . ICTC, page 1459-1462. IEEE, (2022)Backhaul Aggregator Design for Real-Time 3D Printer System., , , , , and . ICTC, page 898-901. IEEE, (2022)Strategic Unmanned Aerial Vehicle (UAV) Routing: An Energy-Efficient Approach., , , , and . INFOCOM Workshops, page 1-5. IEEE, (2023)A UAV-assisted Blockchain Based Secure Device-to-Device Communication in Internet of Military Things., , and . ICTC, page 1896-1898. IEEE, (2020)