Author of the publication

Wormhole attack prevention using clustering and digital signatures in reactive routing.

, , and . ICNSC, page 122-126. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Binarized Neural Machine Translation., , , , , , and . CoRR, (2023)GROOV: A geographic routing over VANETs and its performance evaluation., , , and . GLOBECOM, page 1670-1675. IEEE, (2012)Information Flow and Search in Unstructured Keyword Based Social Networks., , , and . CSE (4), page 1074-1081. IEEE Computer Society, (2009)Echo State Speech Recognition., , , , and . ICASSP, page 5669-5673. IEEE, (2021)Wormhole attack prevention using clustering and digital signatures in reactive routing., , and . ICNSC, page 122-126. IEEE, (2012)Do Current Multi-Task Optimization Methods in Deep Learning Even Help?, , , , and . NeurIPS, (2022)A Loss Curvature Perspective on Training Instabilities of Deep Learning Models., , , , , , , , and . ICLR, OpenReview.net, (2022)Data Scaling Laws in NMT: The Effect of Noise and Architecture., , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 1466-1482. PMLR, (2022)Design and Implementation of Davis Social Links OSN Kernel., , , , , , and . WASA, volume 5682 of Lecture Notes in Computer Science, page 527-540. Springer, (2009)Progressive alignment using Shortest Common Supersequence., and . ICACCI, page 1113-1117. IEEE, (2014)