Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks., , , , , and . Sensors, 23 (21): 8699 (October 2023)Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment., , , , , and . Comput. Syst. Sci. Eng., 46 (3): 3087-3102 (2023)Digital Text Document Watermarking Based Tampering Attack Detection via Internet., , , , , and . Comput. Syst. Sci. Eng., 48 (3): 759-771 (2024)Fuzzy logic image processing., , and . Int. J. Knowl. Eng. Data Min., 6 (3): 207-233 (2019)Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system., , , , , and . Comput. Electr. Eng., (May 2023)Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions., , , , , , , and . Comput. Syst. Sci. Eng., 46 (3): 2947-2961 (2023)Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks., , , , , , , and . Comput. Syst. Sci. Eng., 45 (2): 2033-2047 (2023)Automated Image Captioning Using Sparrow Search Algorithm With Improved Deep Learning Model., , , , , and . IEEE Access, (2023)Lighting Search Algorithm With Convolutional Neural Network-Based Image Captioning System for Natural Language Processing., , , , , and . IEEE Access, (2023)Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems., , , , , , , and . Clust. Comput., 26 (3): 2085-2098 (2023)