From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity., , , и . IWCMC, стр. 394-399. IEEE, (2018)CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks., , , и . IEEE Access, (2023)Behavioral Based Insider Threat Detection Using Deep Learning., , , и . IEEE Access, (2021)RiceChain: secure and traceable rice supply chain framework using blockchain technology., , , , и . PeerJ Comput. Sci., (2022)Whisper in Focus: Enhancing Stuttered Speech Classification with Encoder Layer Optimization., , , и . CoRR, (2023)Crowdsourcing Cybercrimes through Online Resources., , , и . DeSE, стр. 158-163. IEEE, (2020)Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets., , , , и . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (10): 234:1-234:31 (октября 2023)Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols., , , , , и . IEEE Access, (2020)MAD-Malicious Activity Detection Framework in Federated Cloud Computing., , , , , и . DeSE, стр. 273-278. IEEE, (2020)A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN., и . NBiS, стр. 194-199. IEEE Computer Society, (2012)