Author of the publication

Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting.

, , , , and . DSA, page 15-24. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities., , , , and . J. Parallel Distributed Comput., (2019)Enhanced shuffled frog-leaping algorithm for solving numerical function optimization problems., , , , , and . J. Intell. Manuf., 29 (5): 1133-1153 (2018)A Mobile App Authentication Approach by Fusing the Scores from Multi-Modal Data., and . FUSION, page 2091-2097. IEEE, (2018)Control of discrete chaotic systems based on echo state network modeling with an adaptive noise canceler., , , and . Knowl. Based Syst., (2012)Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler., , , , and . J. Syst. Archit., (2017)A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds., , , and . Future Gener. Comput. Syst., (2017)An outstanding adaptive multi-feature fusion YOLOv3 algorithm for the small target detection in remote sensing images., , , and . Pattern Anal. Appl., 25 (4): 951-962 (2022)Regression transformation of prior means for speaker adaptation., , and . EUROSPEECH, page 2507-2510. ISCA, (1999)Prior parameter transformation for unsupervised speaker adaptation., , and . INTERSPEECH, page 698-701. ISCA, (2000)A Survey on Unknown Presentation Attack Detection for Fingerprint., , , and . INTAP, volume 1382 of Communications in Computer and Information Science, page 189-202. Springer, (2020)