Author of the publication

Secure and energy-efficient smart building architecture with emerging technology IoT.

, , , , , and . Comput. Commun., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments., , , , and . IEEE Access, (2021)Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure., , and . IEEE Internet Things J., 8 (11): 9189-9205 (2021)Imbalanced big data classification based on virtual reality in cloud computing., and . Multim. Tools Appl., 79 (23-24): 16403-16420 (2020)A Fuzzy Adaptive Dynamic NSGA-II With Fuzzy-Based Borda Ranking Method and its Application to Multimedia Data Analysis., , and . IEEE Trans. Fuzzy Syst., 29 (1): 118-128 (2021)PIGNUS: A Deep Learning model for IDS in industrial internet-of-things., , , , , and . Comput. Secur., (September 2023)Detection of application layer DDoS attack with clustering and likelihood analysis., , and . GLOBECOM Workshops, page 217-222. IEEE, (2013)Intrusion Detection Traps within Live Network Environment., and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 77-89. Springer, (2019)Dynamic Graph Attention-Aware Networks for Session-Based Recommendation., , and . IJCNN, page 1-7. IEEE, (2020)Learning Outfit Compatibility with Graph Attention Network and Visual-Semantic Embedding., , , and . ICME, page 1-6. IEEE, (2021)Micro-Distortion Detection of Lidar Scanning Signals Based on Geometric Analysis., , , and . Symmetry, 11 (12): 1471 (2019)