Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Annotated crowd video face database., , , , and . ICB, page 106-112. IEEE, (2015)FedTIU: Securing Virtualized PLCs Against DDoS Attacks Using a Federated Learning Enabled Threat Intelligence Unit., , , and . SMARTCOMP, page 233-236. IEEE, (2023)Ultra-wideband star shaped planar monopole antenna., , , , , and . ANTS, page 1-6. IEEE, (2016)An Approach to Waste Segregation and Management Using Convolutional Neural Networks., , and . ICACDS, volume 1244 of Communications in Computer and Information Science, page 139-150. Springer, (2020)Demo: A WhatsApp Bot for Citizen Journalism in Rural India., , , , and . COMPASS, page 423-427. ACM, (2021)Determining the Process Choice Criteria for Selecting a Production System in a Manufacturing Firm Using a Delphi Technique., , and . IEEM, page 1265-1269. IEEE, (2019)AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud., , and . Wirel. Pers. Commun., 115 (2): 1335-1361 (2020)An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach., , and . Int. J. Swarm Intell. Res., 12 (1): 29-49 (2021)A federated learning approach to network intrusion detection using residual networks in industrial IoT networks., , , , and . J. Supercomput., 80 (13): 18325-18346 (September 2024)Clustering based minimum spanning tree algorithm., , and . IC3, page 1-3. IEEE Computer Society, (2017)