Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review Study of Heartbeat Biometric Authentication., , , , and . J. Comput., 13 (8): 936-947 (2018)Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature., , , and . CoRR, (2023)Bilingual Qatar Digital Library: Benefits and Challenges., and . ICADL, volume 11279 of Lecture Notes in Computer Science, page 191-194. Springer, (2018)The University of Maryland at the TREC 2020 Fair Ranking Track., and . TREC, volume 1266 of NIST Special Publication, National Institute of Standards and Technology (NIST), (2020)A Novel Technique for PID Tuning by Linearized Biogeography-Based Optimization., , , and . CSE, page 741-747. IEEE Computer Society, (2014)Providing More Efficient Access To Government Records: A Use Case Involving Application of Machine Learning to Improve FOIA Review for the Deliberative Process Privilege., , and . CoRR, (2020)TRUESET: Faster Verifiable Set Computations., , , , , and . USENIX Security Symposium, page 765-780. USENIX Association, (2014)Comparing Intrinsic and Extrinsic Evaluation of Sensitivity Classification., , and . ECIR (2), volume 13186 of Lecture Notes in Computer Science, page 215-222. Springer, (2022)Jointly Modeling Relevance and Sensitivity for Search Among Sensitive Content., and . SIGIR, page 615-624. ACM, (2019)A New Decision-Making Strategy for Techno-Economic Assessment of Generation and Transmission Expansion Planning for Modern Power Systems., , , , and . Syst., 11 (1): 23 (2023)