Author of the publication

A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location.

, , , , , and . ICDF2C (2), volume 571 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 63-78. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single Image 3D Reconstruction Based on Attention Mechanism and Graph Convolution Network., , , and . ICCAI, page 670-676. ACM, (2022)Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System., , , , and . Sensors, 22 (1): 140 (2022)A density-based approach for text extraction in images., , , and . ICPR, page 1-4. IEEE Computer Society, (2008)A Competitive Swarm Algorithm for Image Segmentation Guided by Opposite Fuzzy Entropy., , , , , and . FUZZ-IEEE, page 1-8. IEEE, (2020)Is the addition of an assisted driving Hamiltonian always useful for adiabatic evolution?, , and . Quantum Inf. Process., 16 (4): 102 (2017)A Multilevel Image Thresholding Based on Hybrid Salp Swarm Algorithm and Fuzzy Entropy., , , , , , and . IEEE Access, (2019)Artificial Intelligence to Power the Future of Materials Science and Engineering., , , , , , , , and . Adv. Intell. Syst., 2 (4): 1900143 (2020)Secure and Privacy-preserving Data-sharing Framework based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery., , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 2284-2292. IEEE, (2022)An Efficient and Secure Scheme for Dynamic Shared Data in Cloud., , , , , and . CSAE, page 155:1-155:6. ACM, (2019)Balancing the Influence of Evolutionary Operators for Global optimization., , , , , , and . CEC, page 1-8. IEEE, (2020)