Author of the publication

A Two-Phase Anomaly Detection Model for Secure Intelligent Transportation Ride-Hailing Trajectories.

, , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4496-4506 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless energy efficient occupancy-monitoring system for smart buildings., , , , and . Pervasive Mob. Comput., (2019)Generating Event Sensor Readings Using Spatial Correlations and a Graph Sensor Adversarial Model for Energy Saving in IoT: GSAVES., , , , and . PIMRC, page 1-6. IEEE, (2023)Car park management with networked wireless sensors and active RFID., , , and . EIT, page 373-378. IEEE, (2015)ADABCAST: Adaptive broadcast approach for solar Energy Harvesting Wireless Sensor Networks., and . WOCC, page 1-6. IEEE, (2017)Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks., and . IWSOS/EuroNGI, volume 4124 of Lecture Notes in Computer Science, page 163-176. Springer, (2006)MANET: Selfish Behavior on Packet Forwarding., and . Encyclopedia of Wireless and Mobile Communications, (2008)Interference-aware Congestion Control Protocol for Wireless Sensor Networks., , , , , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 181-188. Elsevier, (2014)GPU-based Bio-inspired Model for Solving Association Rules Mining Problem., , , and . PDP, page 262-269. IEEE Computer Society, (2017)Intertwined medium access scheduling of upstream and downstream traffic in wireless sensor networks., , , and . WCNC, page 2468-2473. IEEE, (2014)A variant of connected dominating set in unit disk graphs for applications in communication networks., and . EIT, page 457-461. IEEE, (2015)