Author of the publication

Security and privacy of big data for social networking services in cloud.

, , , , and . INFOCOM Workshops, page 438-443. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol., , , , , , and . IEEE Access, (2018)Deep learning models for human centered computing in fog and mobile edge networks., , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 2907-2911 (2019)Medical Image Forgery Detection for Smart Healthcare., , , and . IEEE Commun. Mag., 56 (4): 33-37 (2018)Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations., , , , , and . IEEE Internet Things J., 6 (2): 1402-1409 (2019)Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure., , and . J. Organ. End User Comput., 32 (4): 85-111 (2020)Harness the Global Impact of Big Data in Nurturing Social Entrepreneurship: A Systematic Literature Re view., , , , and . J. Glob. Inf. Manag., 29 (6): 1-19 (2021)Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices., and . Int. J. E Serv. Mob. Appl., 10 (2): 58-74 (2018)Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning Environment., , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 378-385. Springer, (2020)Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation., , , , and . CSoNet, volume 13116 of Lecture Notes in Computer Science, page 340-348. Springer, (2021)Optimized Edge-cCCN Based Model for the Detection of DDoS Attack in IoT Environment., , , and . EDGE, volume 14205 of Lecture Notes in Computer Science, page 14-23. Springer, (2023)