Author of the publication

Detection of anomalous behavior of smartphones using signal processing and machine learning techniques.

, , , , , , and . PIMRC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm., , , and . IEEE Trans. Netw. Sci. Eng., 8 (3): 2559-2574 (2021)A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks., , , and . Symmetry, 14 (8): 1625 (2022)Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network., , , , and . BWCCA, page 348-355. IEEE, (2012)A game theoretic approach to power trading in cognitive radio systems., , , , and . SoftCOM, page 1-5. IEEE, (2012)Exposing resources as Web services: A performance oriented approach., , , , and . SPECTS, page 1-10. IEEE, (2012)Environmental impact on optimization analysis for standalone and hybrid power generating units., , , , and . CCECE, page 994-998. IEEE, (2011)Analytical Modeling and Prediction of Cloud Workload., , , and . ICC Workshops, page 1-6. IEEE, (2021)FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks., , , , , and . GLOBECOM, page 3843-3848. IEEE, (2023)Reusing and converting code clones to aspects - An algorithmic approach., , , and . IRI, page 9-16. IEEE, (2012)A Framework for Automatic Resource Provisioning for Private Clouds., , , , , , and . CCGRID, page 610-617. IEEE Computer Society, (2013)