Your selections:
Trusted autonomous vehicle : measuring trust using on-board unit data
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
The co-evolution of cloud and IoT applications : recent and future trends
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Opinion formation dynamics under the combined influences of majority and experts
- Das, Rajkumar, Kamruzzaman, Joarder, Karmakar, Gour
Impact of friendly jammers on secrecy multicast capacity in presence of adaptive eavesdroppers
- Giti, Jishan, Srinivasan, Bala, Kamruzzaman, Joarder
Priority sensitive event detection in hybrid wireless sensor networks
- Alam, Kh Mahmudul, Kamruzzaman, Joarder, Karmakar, Gour, Murhsed, Manzur
Impact characterization of multiple-points-defect on machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Rashid, Md. Mamunur, Amar, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Instruction cognitive one-shot malware outbreak detection
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Oliver, Jon
Low-power wide-area networks : design goals, architecture, suitability to use cases and research challenges
- Buurman, Ben, Kamruzzaman, Joarder, Karmakar, Gour, Islam, Syed
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
A machine learning approach for prediction of pregnancy outcome following IVF treatment
- Hassan, Md Rafiul, Al-Insaif, Sadiq, Hossain, Muhammad, Kamruzzaman, Joarder
IoT Sensor Numerical Data Trust Model Using Temporal Correlation
- Karmakar, Gour, Das, Rajkumar, Kamruzzaman, Joarder
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
Mobile malware detection : an analysis of deep learning model
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur, IEEE
Multiple-points fault signature's dynamics modeling for bearing defect frequencies
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Survey of recent cyber security attacks on robotic systems and their mitigation approaches
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
Are you sure you would like to clear your session, including search history and login status?