Author of the publication

Intelligent Deep Convolutional Neural Network Based Object Detection Model for Visually Challenged People.

, , , , , and . Comput. Syst. Sci. Eng., 46 (3): 3191-3207 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system., , , , , and . Comput. Electr. Eng., (May 2023)Efficient security level in wireless sensor networks (WSNs) using four-factors authentication over the Internet of Things (IoT)., , , , , , , , , and . PeerJ Comput. Sci., (2024)Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing., , , , , and . Pattern Anal. Appl., 25 (1): 47-62 (2022)Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems., , , , , , , and . Clust. Comput., 26 (3): 2085-2098 (2023)Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms., , , , , , , and . Comput. Commun., (2024)Cooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks., , , , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part A): 7940-7947 (2022)Oppositional poor and rich optimization with deep learning enabled secure internet of drone communication system., , , , , , and . Comput. Electr. Eng., 104 (Part): 108368 (2022)Pelican Optimization Algorithm with Federated Learning Driven Attack Detection model in Internet of Things environment., , , , , , , and . Future Gener. Comput. Syst., (November 2023)Intelligent Deep Convolutional Neural Network Based Object Detection Model for Visually Challenged People., , , , , and . Comput. Syst. Sci. Eng., 46 (3): 3191-3207 (2023)Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach., , , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2952-2963 (September 2023)