Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems., , , , and . Future Internet, 12 (10): 167 (2020)BYANJON: A Ground Truth Preparation System for Online Handwritten Bangla Documents., , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 20 (6): 106:1-106:16 (2021)Application of Structural and Topological Features to Recognize Online Handwritten Bangla Characters., , , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 17 (3): 20:1-20:16 (2018)Extreme learning machine for handwritten Indic script identification in multiscript documents., , , , , and . J. Electronic Imaging, 27 (05): 051214 (2018)Performance and Wirability Driven Layout for Row-Based FPGAs., and . VLSI Design, 7 (4): 353-364 (1998)A secure one time password protocol schema., , and . Int. J. Inf. Priv. Secur. Integr., 3 (2): 75-95 (2017)Process Knowledge-Infused AI: Toward User-Level Explainability, Interpretability, and Safety., , , , and . IEEE Internet Comput., 26 (5): 76-84 (2022)Editorial: Understanding and Bridging the Gap Between Neuromorphic Computing and Machine Learning., , and . Frontiers Comput. Neurosci., (2021)Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network., , , , , and . IEEE Access, (2023)Presentation attack detection: an analysis of spoofing in the wild (SiW) dataset using deep learning models., , and . Discov. Artif. Intell., (2023)