Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Block Parameters on the Throughput and Security of Blockchains., , , and . ICBCT, page 13-18. ACM, (2020)Fixed-time synchronization of fractional order memristive MAM neural networks by sliding mode control., , , , , , and . Neurocomputing, (2020)On Threat Analysis of IoT-Based Systems: A Survey., , and . SmartIoT, page 205-212. IEEE, (2020)Finite-Time Synchronization of Chaotic Memristive Multidirectional Associative Memory Neural Networks and Applications in Image Encryption., , , and . IEEE Access, (2018)Access Control Model Based on Role and Attribute and Its Implementation., , , , , and . CyberC, page 66-71. IEEE, (2016)S-VoteNet: Deep Hough Voting with Spherical Proposal for 3D Object Detection., , , and . ICPR, page 5161-5167. IEEE, (2020)Physical Unclonable Function Based Authentication Scheme for Smart Devices in Internet of Things., , , and . SmartIoT, page 160-165. IEEE, (2018)Towards Human Activity Recognition and Objective Performance Assessment in Human Patient Simulation: A Case Study., , , , and . SMC, page 2702-2707. IEEE, (2020)Type-2 Fuzzy Logic Based DCT for Intelligent Image Compression., and . CIT, page 908-912. IEEE Computer Society, (2014)Automatic User Authentication for Privacy-Aware Human Activity Tracking Using Bluetooth Beacons., , and . SMC, page 3609-3613. IEEE, (2018)