Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Efficiently Processing Workflow Provenance Queries in Spark., , , , , and . ICDCS, page 1443-1452. IEEE, (2019)D-SVM: A Deep Support Vector Machine Model with Different Kernel Types for Improved Intrusion Detection Performance., , and . Int. J. Perform. Eng., 19 (9): 598 (2023)A Multi-Layer Feed Forward Network Intrusion Detection System using Individual Component Optimization Methodology for Cloud Computing., , and . Int. J. Perform. Eng., 18 (11): 781-790 (2022)Monitoring and surveillance of urban road traffic using low altitude drone images: a deep learning approach., and . Multim. Tools Appl., 81 (14): 19683-19703 (2022)DeepMTL Pro: Deep Learning Based Multiple Transmitter Localization and Power Estimation., , , and . Pervasive Mob. Comput., (2022)InstructABSA: Instruction Learning for Aspect Based Sentiment Analysis., , , , and . CoRR, (2023)A New Approach for the Security of VPN., and . ICTCS, page 13:1-13:5. (2016)Measuring 3D left ventricular strain from unwrapped harmonic phase., , , , and . ISBI, page 1433-1436. IEEE, (2008)FSONet: A Wireless Backhaul for Multi-Gigabit Picocells Using Steerable Free Space Optics., , , , , , and . MobiCom, page 154-166. ACM, (2017)Multichannel MAC Protocols for Wireless Networks., , and . SECON, page 393-401. IEEE, (2006)