Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prototypes-Guided Memory Replay for Continual Learning., , , , and . CoRR, (2021)Temporal Knowledge Graph Completion: A Survey., , , , , and . CoRR, (2022)Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions., , , , , , and . CoRR, (2018)A Fast and Scalable Authentication Scheme in IoT for Smart Living., , , , , , and . CoRR, (2020)Detecting false data attacks using machine learning techniques in smart grid: A survey., , , , and . J. Netw. Comput. Appl., (2020)DP-GAN: Differentially private consecutive data publishing using generative adversarial nets., , , , , and . J. Netw. Comput. Appl., (2021)SolcTrans: Towards machine translation of Solidity smart contract source code., , , , and . CoRR, (2021)A fast and scalable authentication scheme in IOT for smart living., , , , , , and . Future Gener. Comput. Syst., (2021)FL-SEC: Privacy-Preserving Decentralized Federated Learning Using SignSGD for the Internet of Artificially Intelligent Things., , , , and . IEEE Internet Things Mag., 5 (1): 85-90 (2022)Multi-Level Virtual Ring: Cross-Level Name Routing with Embedded Identifier in Sensor Network., and . ICWN, page 67-74. CSREA Press, (2009)