Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning Approach., , and . CSR, page 432-439. IEEE, (2023)Mitigating Targeted Universal Adversarial Attacks on Time Series Power Quality Disturbances Models., , , and . TPS-ISA, page 91-100. IEEE, (2023)A Robust Completed Local Binary Pattern (RCLBP) for Surface Defect Detection., , , , , and . SMC, page 1927-1934. IEEE, (2021)Adversarial Attacks on Deep Learning-Based UAV Navigation Systems., , , and . CNS, page 1-6. IEEE, (2023)Blockchain-based Smart Supply Chain Management., , and . DSA, page 203-208. IEEE, (2022)Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework., , , , and . IJCNN, page 1-8. IEEE, (2022)Trojan Attack and Defense for Deep Learning-Based Navigation Systems of Unmanned Aerial Vehicles., , , , , and . IEEE Access, (2024)Detecting Sybil Attacks Using Proofs of Work and Location in VANETs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 39-53 (2022)Identifying Information Superspreaders of COVID-19 from Arabic Tweets., , , , , and . MENACOMM, page 109-114. IEEE, (2021)Smart Supply Chain Management with Attribute-Based Encryption Access Control., and . CCWC, page 198-204. IEEE, (2023)