Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Fuzzy Logic Hydraulic Turbine Governor., , and . Control. Intell. Syst., (2004)Privacy-Preserving Intra-MME Group Handover via MRN in LTE-A Networks for Repeated Trips., , , and . VTC Fall, page 1-5. IEEE, (2017)Performance Analysis of Physical-Layer-Based Authentication for Electric Vehicle Dynamic Charging., and . VTC Fall, page 1-7. IEEE, (2018)Optimization of the output power of a frequency-up conversion piezoelectric energy harvester., , , and . MWSCAS, page 1-4. IEEE, (2016)Privacy-Preserving and Hardware Acceleration-Based Authentication Scheme for Data Collection in E-Health Applications., , , , , , and . MWSCAS, page 703-707. IEEE, (2023)An Online Model-Free Reinforcement Learning Approach for 6-DOF Robot Manipulators., , , , , and . ROSE, page 1-7. IEEE, (2023)Efficient Privacy-preserving Charging Coordination with Linkability-resistance in the Smart Grid., , , , and . GLOBECOM (Workshops), page 1-5. IEEE, (2021)Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks., , , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (5): 871-884 (2019)Enhanced Multi-Level Secure Over-the-Air Update System using Adaptive AUTOSAR., and . ICCA, page 1-4. IEEE, (2023)Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks., , , , and . ISNCC, page 1-7. IEEE, (2021)