Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Frame Work of Security Attacks, Issues Classifications and Configuration Strategy for IoT Networks for the Successful Implementation., , , , , and . IC3I, page 1336-1339. IEEE, (2022)Design a Blockchain Based Security Algorithm for IoT based Healthcare., , and . ICCCNT, page 1-6. IEEE, (2023)Machine Learning Adoption in Blockchain-Based Smart Applications., , , , , and . IC3I, page 372-378. IEEE, (2022)The Multi-Layer Security Network Authentication System Development Through Blockchain Technology., , , , , and . IC3I, page 967-972. IEEE, (2022)Fledge: Flexible Edge Platforms Enabled by In-memory Computing., , , , , , , , and . DATE, page 1181-1186. IEEE, (2020)Algorithmic Analysis of Automatic Attendance System Using Facial Recognition: A Revolutionary Approach for Future Education., , , and . Int. J. Decis. Support Syst. Technol., 14 (1): 1-19 (2022)Embodied Multimodal Multitask Learning., , , , and . IJCAI, page 2442-2448. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..Identifying Parkinson's Patients: A Functional Gradient Boosting Approach., , , and . AIME, volume 10259 of Lecture Notes in Computer Science, page 332-337. Springer, (2017)Semantic Curiosity for Active Visual Learning., , , and . ECCV (6), volume 12351 of Lecture Notes in Computer Science, page 309-326. Springer, (2020)Secrecy Performance of SIMO Underlay Cognitive Radio Networks Over α - μ Fading Channels., and . IEEE Access, (2021)