Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing E-Healthcare Privacy Preservation Framework through L-Diversity., , , and . IWCMC, page 394-399. IEEE, (2018)CrossDomain Recommendation Based on MetaData Using Graph Convolution Networks., , , and . IEEE Access, (2023)Behavioral Based Insider Threat Detection Using Deep Learning., , , and . IEEE Access, (2021)RiceChain: secure and traceable rice supply chain framework using blockchain technology., , , , and . PeerJ Comput. Sci., (2022)Analytical study of hardware-rooted security standards and their implementation techniques in mobile., , , , and . Telecommun. Syst., 74 (3): 379-403 (2020)Whisper in Focus: Enhancing Stuttered Speech Classification with Encoder Layer Optimization., , , and . CoRR, (2023)Crowdsourcing Cybercrimes through Online Resources., , , and . DeSE, page 158-163. IEEE, (2020)A novel cloud management framework for trust establishment and evaluation in a federated cloud environment., , and . J. Supercomput., 77 (11): 12537-12560 (2021)Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols., , , , , and . IEEE Access, (2020)Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets., , , , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 22 (10): 234:1-234:31 (October 2023)