Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mechanism for detecting dishonest recommendation in indirect trust computation., , and . EURASIP J. Wireless Comm. and Networking, (2013)Magnetic resonance and computed tomography image fusion using saliency map and cross bilateral filter., , , , and . Signal Image Video Process., 13 (6): 1157-1164 (2019)An attack resistant method for detecting dishonest recommendations in pervasive computing environment., , and . ICON, page 173-178. IEEE, (2012)Weighted image fusion using cross bilateral filter and non-subsampled contourlet transform., , , , and . Multidimens. Syst. Signal Process., 30 (4): 2199-2210 (2019)HRS-CE: A hybrid framework to integrate content embeddings in recommender systems for cold start items., , , and . J. Comput. Sci., (2018)Trust management for SOA based social WoT system., , , and . ICACT, page 387-392. IEEE, (2018)Modeling interaction using trust and recommendation in ubiquitous computing enivornment., , and . EURASIP J. Wireless Comm. and Networking, (2012)A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment., , and . AINA Workshops, page 1050-1055. IEEE Computer Society, (2013)STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment., , and . APSCC, page 330-336. IEEE Computer Society, (2011)An adaptive framework for trust based security in pervasive computing environment., , and . CCNC, page 624-628. IEEE, (2012)