Author of the publication

Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks.

, , , and . Q2SWinet, page 71-78. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environmental impact on optimization analysis for standalone and hybrid power generating units., , , , and . CCECE, page 994-998. IEEE, (2011)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)Reusing and converting code clones to aspects - An algorithmic approach., , , and . IRI, page 9-16. IEEE, (2012)Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , and . Symmetry, 14 (8): 1625 (2022)Analytical Modeling and Prediction of Cloud Workload., , , and . ICC Workshops, page 1-6. IEEE, (2021)Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network., , , , and . BWCCA, page 348-355. IEEE, (2012)A Framework for Automatic Resource Provisioning for Private Clouds., , , , , , and . CCGRID, page 610-617. IEEE Computer Society, (2013)A game theoretic approach to power trading in cognitive radio systems., , , , and . SoftCOM, page 1-5. IEEE, (2012)Exposing resources as Web services: A performance oriented approach., , , , and . SPECTS, page 1-10. IEEE, (2012)