From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Intrusion Detection Mechanism for Secured IoMT Framework Based on Swarm-Neural Network., , , , и . IEEE J. Biomed. Health Informatics, 26 (5): 1969-1976 (2022)A neutrosophic WPM-based machine learning model for device trust in industrial internet of things., и . J. Ambient Intell. Humaniz. Comput., 14 (4): 3003-3017 (2023)A novel approach of digital image watermarking using HDWT-DCT., , и . GSCIT, стр. 1-6. IEEE, (2015)Service Deployment Strategy for Predictive Analysis of FinTech IoT Applications in Edge Networks., , , , , , и . IEEE Internet Things J., 10 (3): 2131-2140 (февраля 2023)An IoT Framework for Heart Disease Prediction based on MDCNN Classifier.. CoRR, (2020)ASTREAM: Data-Stream-Driven Scalable Anomaly Detection With Accuracy Guarantee in IIoT Environment., , , , , , и . IEEE Trans. Netw. Sci. Eng., 10 (5): 3007-3016 (сентября 2023)A formal method for privacy-preservation in cognitive smart cities.. Expert Syst. J. Knowl. Eng., (2022)An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things., и . J. Supercomput., 77 (6): 6236-6250 (2021)A Computational Model for Reputation and Ensemble-Based Learning Model for Prediction of Trustworthiness in Vehicular Ad Hoc Network., , , и . IEEE Internet Things J., 10 (20): 18248-18258 (октября 2023)Current differencing buffered amplifier an active element: a review of recent developments., и . ICACCI, стр. 232-236. ACM, (2012)