Author of the publication

Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network.

, , , , , , and . Expert Syst. J. Knowl. Eng., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation of Wireless Local Area Network., , , and . IMECS, page 467-470. Newswood Limited, (2007)Periodic Solution for ∇ -Stochastic High-Order Hopfield Neural Networks with Time Delays on Time Scales., , and . Neural Processing Letters, 49 (3): 1681-1696 (2019)Cone Codebook for Limited Feedback Beamforming over Correlated MIMO Channels., , , and . VTC Spring, page 1-5. IEEE, (2013)Improving abdomen tumor low-dose CT images using dictionary learning based patch processing and unsharp filtering., , , and . EMBC, page 4014-4017. IEEE, (2013)Capturing User Intent for Analytic Process., , , , , , , and . UMAP, volume 5535 of Lecture Notes in Computer Science, page 349-354. Springer, (2009)Comparison of Agentsl Performance in Learning to Cross a Highway for Two Decisions Formulas., and . ICAART (1), page 208-219. SciTePress, (2017)Effects of Agents' Fear, Desire and Knowledge on Their Success When Crossing a CA Based Highway., , , and . ACRI, volume 9863 of Lecture Notes in Computer Science, page 446-455. Springer, (2016)An Information Audit System Based on Bayes Algorithm., , , , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 869-876. Springer, (2006)A 1 V, 0.53 ns, 59 μW Current Comparator Using Standard 0.18 μm CMOS Technology., , , , , and . Wireless Personal Communications, 111 (2): 843-851 (2020)Stokes parameters and DOAs estimation of partially polarized sources using a EM vector sensor., , and . Signal Image Video Process., 11 (4): 737-744 (2017)